Edit Mode

A Community-Driven Data Value Network

Integrating D-Storage and CD²N, offering data economy infrastructure

Pooling storage resources into a unified pool, ensuring authenticity, data integrity, security, and decentralized consensus

Proof of Data Reduplication and Recovery Ensures the security, integrity, and availability of data
Proof of Idle Space Validates space through the generation of idle files
Proxy Re-encryption Technology Secures the circulation of data
Random Rotational Selection Dual randomness guarantees decentralization
Adopting data redunancy and radom challege mechanisms Proof of Data Reduplication and Recovery (PoDR²)
Idle files are generated in a Stacked Bipartite Expanders directed acyclic graph and verified through random challenges Proof of Idle Space(PoIS)

Proxy Re-encryption Technology (PReT)

PReT enables the sharing, circulation, and transfer of data ownership among users without disclosing data privacy Proxy Re-encryption Technology (PReT) PReT enables the sharing, circulation, and transfer of data ownership among users without disclosing data privacy

Random Rotational Selection (R²S)

Validators rotate based on consensus node scores, with the top 11 becoming next round's validators. Validators execute a Verifiable Random Function (VRF) to produce blocks Random Rotational Selection (R²S)

Designed for Efficiency, Security, and Scalability

Designed for Efficiency,