About Aidos Kuneen (ADK)
Aidos Kuneen (ADK) is the take on an innovative new distributed ledger which is based on a DAG (directed acyclic graph). Even though doesn’t suffer from the same problems as a Blockchain (e.g. scalability) it is still based on the same underlying principles: it’s still a distributed database, it’s still a P2P Network and it still relies on a consensus and validation mechanism.
Aidos Kuneen (ADK) The structure of the Mesh is defined by the following concept: Each transaction directly verifies two other transactions and therefore confirms that they are valid and conform to the protocols rules. This directly influences how we reach consensus: Instead of having PoW (miners) or PoS (stakers) be responsible for the overall consensus the entire network of active participants are directly involved in the approval of transactions. As such, consensus in ADK is no longer decoupled from the transaction making process: it’s an intrinsic part of it, and it’s what enables ADK to scale in an unrivaled fashion without any transaction fees.
Aidos Kuneen (ADK) This makes it so ADK can operate as an autonomous decentralized and self-regulating p2p network. Let’s first look at scalability, which they already addressed in the previous part. It’s probably one of the biggest advantages ADK inherits compared to traditional Blockchains of the 1st and 2nd generation. In ADK there is no necessity to order values of seeds or addresses. Since consensus is parallelized, and not done in sequential intervals of batches as in blocks, the network is able to grow and scale dynamically with the number of transactions.
Aidos Kuneen (ADK) more transactions are made, the more secure and the more efficient the Mesh gets. When a node is synching, it just iterates through all transactions. The values from all transactions will be grouped into their addresses, even if they are in their previous order or not. When the all transactions are processed, every address will contain the current correct balance. There is no max-count of transactions in one block like in Blockchains and there will certainly be no -debate.
Aidos Kuneen (ADK) Storage Key Points
Coin Basic | Information |
---|---|
Coin Name | Aidos Kuneen |
Short Name | ADK |
Circulating Supply | 25,000,000 |
Total Supply | 287,218,749 |
Source Code | Click Here To View Source Code |
Explorers | Click Here To View Explorers |
Chat | Click Here To Visit |
Whitepaper | Click Here To View |
Support | 24/7 |
Official Project Website | Click Here To Visit Project Website |
Security
Supercomputers are today’s most powerful computers, with a classic architecture. Quantum computers, on the other hand, have only been theorized so far and some tiny prototypes have been built. When quantum computers are a thing, most current cryptography (and cryptocurrencies) will no longer be secure. For this reason, mathematicians and computer scientists have invented new cryptographies which will be unbreakable even by quantum computers. ADK already uses a quantum-secure cryptography: the Winternitz one-time signature scheme.
No Chains
Aidos Kuneen is based on IMesh, an innovative new distributed ledger which is based on a DAG (directed acyclic graph), in which every transaction directly verifies two other transactions and therefore confirms that they are valid and conform to the protocol’s rules.
100% Anonymous
The Aidos transaction system is based on a directed mesh with I2P as underlying network layer, protecting its users from having their identities revealed. Furthermore the usage of AKshuffle keeps user anonymous, therefor making transactions 100% invisible and untraceable.
Advantages
Decentralized
Fast payments
Scalable and without blocks
Simple and affordable
Zero transaction costs
Confidentiality
Quantum data protection
Micropayments
AKConsensus
As mentioned in the previous section, we must assume that during iMesh’s infancy period an attacker with access to sufficient resources could realistically command the majority of the total network hash power. It is for this reason that we are therefore unable to fully trust the SPECTRE consensus mechanism during the early stages of network growth. Thus we must introduce ‘AK Consensus’, a temporary system which utilizes a Federated Byzantine Agreement (FBA) based on the ‘The Ripple Protocol Consensus Algorithm’ along with a semi-trusted model as detailed in [18], in order to validate transactions until such time as the SPECTRE consensus mechanism can take over.
Within the Ripple Protoco,l the FBA process is used in order to confirm the validity of all transactions. A similar process, referred to as ‘AK Consensus’ has been adopted for Kuneen, however, it should be noted that the implementation of this process within differs significantly from that of Ripple. With AKConsensus in place, a group of trusted nodes periodically review a randomly selected transaction from within mesh. If this group of trusted nodes reaches an agreement on the validity of this transaction, the transaction becomes known as a ‘Statement’, and now serves to act as a milestone within the network.
Leave a Review