Integrating D-Storage and CD²N, offering data economy infrastructure
Pooling storage resources into a unified pool, ensuring authenticity, data integrity, security, and decentralized consensus
Ensures the security, integrity, and availability of data
Validates space through the generation of idle files
Secures the circulation of data
Dual randomness guarantees decentralization
Adopting data redunancy and radom challege mechanisms
Idle files are generated in a Stacked Bipartite Expanders directed acyclic graph and verified through random challenges
Proxy Re-encryption Technology (PReT)
PReT enables the sharing, circulation, and transfer of data ownership among users without disclosing data privacy
Random Rotational Selection (R²S)
Validators rotate based on consensus node scores, with the top 11 becoming next round's validators. Validators execute a Verifiable Random Function (VRF) to produce blocks
Designed for Efficiency,
Security, and Scalability