Affidaty Blog
  • History
  • Press & Partnerships
  • Events
  • Educational
  • ItalianoItaliano
  • History
  • Press & Partnerships
  • Events
  • Educational
No Result
View All Result
Affidaty Blog
Home Edu

Inside blockchain. The transaction: how and by what it is composed.

Giovanni CapacciolibyGiovanni Capaccioli
July 16, 2019
in Edu
Reading Time: 6 mins read
Share on LinkedInShare on FacebookShare on Twitter
Transazione-Hashing
Blockchain-easy

Index

  • Intro.
  • Overview
  • Speaking about the transaction
  • Structure of the transaction: cypher keys

Intro.

We started to recognize that the critical elements inside a blockchain are the transaction, the blocks, the nodes and the ledger. However, let’s start from the beginning: what is a transaction inside a blockchain?

Overview

The key concept is that transactions are stored inside a hashed block, which “contains” the information of the current block and the hash of the previous one. That’s why it’s called “chain”: the block hash is unalterably connected to the previous one, so a block is immutably connected to the previous one, with everything it is stored inside.

Nodes (the “Consensus” or the “proof of ..”) work inside the blockchain, validating it, keeping it safe, sharing it inside the distributed network. The blockchain, therefore, is the totality of the blocks firmly connected, chained together. 

Nodi

Speaking about the transaction

As above mentioned, every block contains the transactions, which can be considered as the “data” constituting the “shared databases” composing the ledger of the blockchain (Distributed Ledger Technology).

The transactions can be shaped in different ways, according to the rules (governance) of a blockchain; due to the general transaction coding rules, these are structured in this way: there is the sending user, the description of the transaction and finally the receiving user. Both users have access to their cypher keys, besides obviously their Wallet (digital wallet).

Structure of the transaction: cypher keys

“Cipher keys” are the essential elements to open and run transactions. These aren’t hard to understand: every user creates his/her “digital wallet” right when he/she decides to join the blockchain to use it.

This wallet has the same function as a concrete one, with the difference of being digital. Imagine having access to an app on your smartphone or to your home banking system. Right, to safely use this app on a blockchain (both from a personal computer and a smartphone), you are given two cypher keys: one private, one public. 

These aren’t physical keys, but cypher keys, digital ones, that is a series of alphanumeric codes. Both are essential because both have a specific function. For every couple of keys, the system creates a public address which is frequently linked to a QR code, that is a kind of barcode which can be used by smartphone cameras to ease some procedures.

For convenience, it is frequently stated that the public key is the recipient address when it is an alphanumeric code which is automatically calculated by the hash function of the public key. So, technically speaking, a user can automatically obtain his/her public address from his public key. This process is meant to enhance even more the security. 

The private key is the one that is not to be shared with anyone (shortly you’ll understand why), while the public key is the one that can be shared with everyone. Their use is easy to describe: the user that creates the transaction will sign it with its private key; he/she will include the recipient public key. 

The private key (in the preceding that will be shortly described) has a signing function, thanks to this you (that have the private key) assure that you initiated the transaction and consequently approved it. 

That’s what happens:

  1. Irene has a document that wants to share via blockchain with Alessio. She will access the software to create the transaction and share the material for a monetary fee (coin, cryptocurrency). She creates the transaction, inserting the document and eventual details; she will include her digital signature because she has to demonstrate to everybody that she is the owner of the paper she’s selling;
  2. She creates the digital signature: firstly, she hashes the document; then uses her private key to cypher the hash; that’s why the ciphered hash is called digital signature. Technically speaking, these coding actions are not handmade by the user but are automatically generated by the system.
  3. Alessio accepts to pay the fee for Irene’s document, the transaction between Irene and Alessio comes to life;

And that’s how another significant advantage of the blockchain comes to life: the user can verify the transaction and its digital signature, he/she doesn’t need to trust it blindly, he/she can simply use the mathematical instruments that the blockchain provides. 

  1. Alessio can verify the digital signature if he wants because it is allowed by the transaction: Alessio can decrypt Irene’s digital signature using her public key. The outcome is the hash of the document (Hash A);
  2. Alessio can apply the same algorithm to the received, and the output will be the has of the received text (Hash B);
  3. Finally, Alessio can buy both hashes (Hash A and B) to be sure that the transaction has not been altered.

In essence: users use their private key to make fundamental actions, but they never share it: in this way the private key is not available to malicious users, so the digital signature is kept safe.

Creazione-Firma-Digitale-steps

Once that the transaction has been secured, it’s safety can be audited by comparing two figures:

  1. The hashing value of the ciphering between the digital signature and the public key, or Hash A;
  2. The hash value of the data inside the transaction (the file, image or document), or Hash B;
Verifica-della-firma-digitale

Now such transaction goes into the block while waiting for it to be filled up to its capacity, then closed and secured. 

Tags: BlockchainLedgerTraceabilityTransaction
Previous Post

Possible Blockchain applications

Next Post

Elements of Blockchain: Digital token. What it is and what it is used for.

Giovanni Capaccioli

Giovanni Capaccioli

Related Posts

Boy working on the computer
Edu

This is progress … the rest is marketing.

November 15, 2019
Regulatory framework and fields of application.
Edu

Regulatory framework and fields of application.

October 17, 2019
DLT, Blockchain: types and limits.
Edu

DLT, Blockchain: types and limits.

October 16, 2019
Next Post
Il token digitale. Cos’è e a cosa serve.

Elements of Blockchain: Digital token. What it is and what it is used for.

The birth of Affidaty: a story to tell

Una variante della classica Proof of Work: Ethereum.

A different version of the classic Proof of Work: Ethereum

Instagram

  • Soges, società specializzata per lavorare al fianco di imprese e istituzioni, sceglie la #blockchain #trinci e la nostra #hdemy per far crescere ed evolvere i futuri piani di sviluppo digitali dei propri clienti.
  • La nostra #blockchain Hdemy di nuovo al lavoro nella realizzazione di nuovi contenuti, dall’inquadramento contabile e fiscale delle #crypto ad una panoramica su tutto l’ecosistema #Synkrony, banking, exchange e pay component.
  • Tutto pronto per la prima giornata del Blockchain Revolution Summit. In queste due giornate parleremo delle applicazione legate a T.R.I.N.C.I. Blockchain, del circuito Synkrony® e della Blockchain Hdemy.
  • New partnership with @analyticagram to improve our Blockchain Hdemy!
  • The Affidaty team wishes you a very happy #easter weekend!!
  • How do you build a blockchain from scratch? 
All you need is a clear idea of what you want to create, a team of dreamers, a lot of determination, top-notch techs and a bold administration, several members committed to the business, customers and communication.. And a place for all this to thrive. 
Just another ordinary day at Affidaty.
  • Very exciting day spent working on some #blockchain projects with @fvtura_official tech members. Together, we analyzed the main components of T.R.I.N.C.I. Blockchain, the setup of #smartcontracts , #nft and WOW Exchange’s features.
  • Testing some new Exchange features!
Today 8 of our technicians tested the new token listing workflow. WOW Exchange’s mission is to give any user wider access to cryptos, as well as simplifyng trade and exchange processes.
#exchange #crypto #trade #teamwork
  • Let’s start 2022 off with 12 Independent Chain nodes ready to be shipped and used by one of our System Integrators from Northern Italy!
#blockchaintechnology #node #blockchainnetwork

Categories

  • Edu
  • Events
  • Press & Partnerships – Eng
  • Senza categoria

Topics

Blockchain Ethash Ethereum Ledger PoA PoS Proof of Authority Proof of Stake Proof of Work Smart Contracts Traceability Transaction Trinci

LinkedIn Page

Facebook Page

Search into the blog

No Result
View All Result

About

Affidaty S.p.A. blog studies and shares issues related to the Blockchain world and how this technology can change everyday life. Be part of our blog community to follow our updates and the latest trends in a rapidly expanding and changing world such as that of Blockchain and cryptocurrencies.

Director

  • Giovanni Capaccioli

CMO @ Affidaty S.p.A.

  • Riccardo Setti
Affidaty Blog

Affidaty S.p.A, © Copyright 2020 - P.IVA IT 06641600488 - All rights reserved. Designed by Affidaty ICT Department.
Cookie settings

Navigate Site

  • History
  • Press & Partnerships
  • Events
  • Educational

Follow Us

No Result
View All Result
  • ItalianoItaliano
  • History
  • Press & Partnerships
  • Events
  • Educational

Affidaty S.p.A, © Copyright 2020 - P.IVA IT 06641600488 - All rights reserved. Designed by Affidaty ICT Department.
Cookie settings