The FHPoS Consensus Agreement

There are still quite a number of blockchain networks, such as the most famous Bitcoin and Ethereum (ETH 2.0 is moving towards PoS 2.0), both using a proof of work system that relies on essentially asymmetric algorithmic puzzles.These proofs are extremely difficult to generate, but third-party validation is simple.The security of these networks is achieved through the whole network consensus that the computational power required to generate a valid proof is difficult to forge, and that the cumulative difficulty of chains as subsequent blocks are added to the blockchain becomes very difficult to create.

However, these computationally large proofs are of no other use for blockchain networks.We define usefulness as work valuable to blockchain networks besides protecting distributed ledgers.While other networks have tried to turn mining power into something useful, such as Ethereum executing small programs called smart contracts, most of the work is not useful or reusable.The mining process is also extremely wasteful, as the determinant at work is usually computational power, which consumes a lot of power and requires a lot of hardware to perform.

The consensus mechanism of FHPoS is that for each time period, the system selects a set of entities called veriators, and over the next election cycle will play a critical role in highly sensitive protocols, such as block production and final validation.The quality and quantity of work are high, thus requiring running costly operations to ensure high communication responsiveness and build a long-term, reliable reputation.Therefore, the verifier also needs to pledge as a guarantee of good behavior.When departing from the normal track, the pledge will be punished according to its severity.Instead, they are rewarded when they do their diligence to the rules.Any node that completes a node task or can meet the requirements can publicly become a candidate verifier.Of course, due to various reasons, there can only be limited verifiers, which will be 21 in the early stage, and the later stage may be expected to reach hundreds or even thousands according to the whole network development situation.

We also encourage FOGR holders to join as much in the web ecology as possible and vote on veriators as electors.If the candidate verifier supported by the elector officially enters the verification person node pool, the elector will receive a corresponding return based on the proportion of the amount pledged and the proportion of the commission ratio.Unlike the verifier, there is no number of electors.As long as the elector chooses and supports only the candidate validation person with good security practices, then the risk is low and there is a constant source of income.

This elector-verifier design has a very strong security guarantee.It allows the system to select verification nodes with large total pledge and eliminate candidates with relatively low total number of pledges.In fact, at any given moment, we want a significant portion of the FOGR being pledged.This makes it difficult for hostile groups to become verification nodes (because they need to build a strong reputation to get the support needed) and the cost of the attack system is high (as any attack results in lots of FOGR cut).

Our consensus mechanism scheme is much more efficient than the working proof of interest mechanism (PoW) and much faster than the equity proof mechanism (PoS): it allows almost all participants holding FOGR to continuously participate, thus maintaining high levels of security while limiting the number of validation nodes, so all basic network operations are efficient.To prevent collusion between the verifier and the collector, the verifiers were randomly assigned at regular intervals.

Blockchain technology application has always been the most concerned topic, and as the public chain carrying the application, its performance determines the application of the upper limit of the application, including Ethereum upgrade, are committed to improving system performance.The birth of public chain and intelligent contracts provides a carrier for blockchain applications, but the application scenarios are also limited by the public chain.One of the obstacles to large-scale applications of blockchain is scalability, the performance of blockchain.Extenability limits blockchain transaction throughput, leading to congestion and higher transaction fees, which Ethereum often faces.Capacity expansion is the fundamental solution to solve network congestion, and the multi-layer structure is one of the main ways to achieve capacity expansion.Through the multi-layer structure, the data can be processed in parallel in different network partitions to improve the processing efficiency of the system.For example, Ethereum's Layer 2 expansion scheme puts the calculation process under the chain and sends the final results back to the chain to enhance the information processing ability of the block chain.Public chain multi-layer structure has different ways, including parallel chain and relay chain, lamination, Layer 2, main network and subnet.

Last updated