SatoshiChain
  • What is SatoshiChain?
    • 1.1 Phases
    • 1.2 Connect To SatoshiChain
    • 1.3 Solutions
    • 1.4 Characteristics
  • Main Features
    • 2.1 'Clique' Proof-of-Authority (PoA) Consensus
    • 2.2 EVM-compatible
    • 2.3 Decentralized Governance
    • 2.4 Cross-chain Compatibility
  • Background
    • 3.1 Cryptographic Hash Functions
    • 3.2 Digital Signatures
      • 3.2.1 Secp256k1 Curve
      • 3.2.2 ECDSA Signature Algorithm
    • 3.3 Ethereum Virtual Machine (EVM)
    • 3.4 Consensus Protocols
      • 3.4.1 Proof-of-Work (PoW) - Nakamoto Consensus
      • 3.4.2 Istanbul Byzantine Fault Tolerant (IBFT)
      • 3.4.3 IBFT Proof of Authority (PoA)
      • 3.4.4 IBFT Proof-of-Stake (PoS)
      • 3.4.5 RAFT
      • 3.4.6 'Clique' Proof-of-Authority (PoA)
      • 3.4.7 Comparison and Selection
  • Developers
    • 4.1 SatoshiChain Layering Architecture
    • 4.2 SatoshiChain Cross-Chain Protocol
    • 4.3 SatoshiChain Design
    • 4.4 Native Currency of SatoshiChain: The $SC Token
    • 4.5 SatoshiChain Configurations
  • VE Model for SatoshiChain
    • 5.1 Voting Power
    • 5.2 How to Use $veSC
  • Smart Contracts of SatoshiChain
    • 6.1 Validator Set Contract
    • 6.2 Slashing Contract
    • 6.3 Staking Contract
    • 6.4 Governance Contract
    • 6.5 Vault Contract
    • 6.6 Bridge Contract
  • SatoshiChain Staking
  • SatoshiX Decentralized Exchange (DEX)
  • Potential Applications
    • 9.1 NFT
    • 9.2 DeFi
    • 9.3 GameFi
  • Become a Validator Node Operator
Powered by GitBook
On this page
  1. Main Features

2.1 'Clique' Proof-of-Authority (PoA) Consensus

Community users can participate in the network which ensures a permissionless and decentralized blockchain

Overview This section aims to provide a better understanding of some concepts that are currently present in SatoshiChain's Proof of Authority (PoA) implementation.

The SatoshiChain Proof of Authority (PoA) implementation is intended to be a replacement for the existing PoA IBFT implementation, allowing node operators to easily choose between the two when establishing a chain.

PoA Advantages

  • Efficiency: PoA is more efficient than other consensus mechanisms, such as Proof of Work (PoW), because it does not require miners to compete for the right to verify transactions. This can lead to faster transaction speeds and lower transaction fees.

  • Scalability: PoA is more scalable than PoW because it can support more transactions per second without sacrificing security. This is because PoA networks do not require a large number of nodes to verify transactions.

  • Security: PoA is more secure than PoW because it is less susceptible to 51% attacks. This is because PoA networks require a small number of trusted validators to verify transactions.

  • Cost-effectiveness: PoA is more cost-effective than PoW because it does not require miners to invest in expensive hardware. This can make PoA networks more accessible to businesses and individuals.

PreviousMain FeaturesNext2.2 EVM-compatible

Last updated 1 year ago