Vocabulary
Blockchain
A decentralized database technology where data is packaged into "blocks" and linked in chronological order to form a "chain," with each record being tamper-proof. The DF Protocol stores computing power results, identity data, and incentive information on-chain to ensure information security and verifiability.
Node
A participant unit in a blockchain network; each node can perform verification, data transmission, or storage. In DF, a node refers to a participant that provides computing power, reports calculation results, and participates in ecological governance, with each node bound to a unique identity (DH-ID).
Public / Private Key
Blockchains use asymmetric encryption, where each account has a pair of keys: the public key is used for identity verification, and the private key is used for signing and authorization. DF generates node identities (DH-ID) using public keys and signs computing power data with private keys to ensure the authenticity of identities and computations.
Encrypted Communication
Refers to nodes encrypting information through algorithms to prevent data from being eavesdropped on or tampered with during transmission. The DF Protocol builds a communication encryption layer based on Diffie–Hellman to ensure secure and private transmission between users and nodes.
Key Exchange
A process where two nodes generate a shared encryption key over an insecure network without directly transmitting the key. DF uses the Diffie–Hellman protocol to generate shared keys, enabling secure communication between nodes and preventing man-in-the-middle attacks.
Smart Contract
A program written on the blockchain that automatically executes specific logic (e.g., payments, burns, reward distribution). DF’s profit distribution, node incentives, and computing power verification are all completed through smart contracts without manual intervention.
Token
A digital asset in a blockchain network that can represent rights, tokens, points, etc. The DF Protocol uses three tokens: DF (mining incentive), CPT (subscription deposit), and DG (withdrawal fuel), each undertaking different economic functions.
Exchange
A platform that provides digital asset trading services. CoinP is the official cooperative exchange of DF, responsible for computing power subscriptions, asset circulation, and liquidity support, providing a market and user base for the DF ecosystem.
Computing Power
The ability to execute computing tasks. In DF, computing power is not only a resource but also a "value unit" that can be cryptographically confirmed and on-chain verified, serving as the core basis for users to participate in profit sharing.
Mining
The process of participating in network tasks through computing power to obtain token rewards. DF’s "mining" does not involve block mining; instead, it requires submitting cryptographically verified computing tasks, which earn DF rewards upon verification, emphasizing authenticity and traceability.
Node Binding
Users or institutions generate and bind a node identity (DH-ID) through a wallet address and key pair. Once bound, the node can participate in computing power reporting, incentive claiming, and ecological governance, serving as the first step in building trust.
Whitelist / KYC
To ensure compliance and asset security, some functions require identity verification (Know Your Customer). In DF, users must complete basic verification through the CoinP platform to access the computing power ecosystem and withdraw assets.
Diffie–Hellman Key Exchange (DH)
Proposed by Whitfield Diffie and Martin Hellman in 1976, Diffie–Hellman is one of the earliest key exchange protocols in modern cryptography. Its main function is to allow two communicating parties to negotiate a shared key over an insecure channel without transmitting a plaintext key in advance. In the DF Protocol, DH (or the more commonly used ECDH) is used to establish end-to-end encrypted (E2EE) communication channels between nodes, ensuring the confidentiality and non-eavesdropping of computing power data, identity messages, and profit information during off-chain transmission.
ECDH (Elliptic Curve Diffie–Hellman)
An elliptic curve variant of the Diffie–Hellman protocol, featuring higher security strength and lower computational costs, and is one of the mainstream key exchange mechanisms currently. The DF Protocol applies ECDH to node key generation, identity binding, and communication encryption protocols, forming a more lightweight security foundation with quantum-resistant scalability.
Node DH-ID (Node Encrypted Identity)
Node DH-ID is a unique identity identifier generated for each node in the DF Protocol by hashing its ECDH public key. This identifier is independent of centralized accounts and possesses unforgeability and trustlessness. In the protocol, DH-ID is bound to node computing power reporting, reward claiming, and governance rights, serving as the infrastructure for trusted on-chain identity authentication.
PoSW (Proof of Secure Work)
PoSW is a secure computing power verification mechanism proposed by the DF Protocol, used to verify the authenticity of computing power data reported by nodes. Combining signature verification, timestamp analysis, and random sampling, this mechanism ensures that each piece of computing power data is generated by real computing tasks, preventing forgery, duplication, or duplicate submission. After successful verification, the computing power record is written on-chain, serving as the sole basis for subsequent incentive calculations.
Verifiable Computing
A class of cryptographic mechanisms used to prove that a computing task has been actually completed by a specific entity within a certain time frame. This concept is widely applied in fields such as blockchain, privacy computing, and AI training. In the DF Protocol, PoSW is a practical application of verifiable computing. Through the model of off-chain task execution + on-chain verification, it realizes the cryptographic right confirmation logic of "computing power as an asset."
CoinP Wallet
CoinP Wallet is the official designated asset hosting tool for the DF Protocol, supporting on-chain asset management, revenue settlement, node identity binding, and cross-chain interaction. It not only provides institutional-grade security but also hosts the value circulation closed-loop of users’ computing power assets, serving as the front-end entry and core user-side component for the operation of the DF Protocol.
Last updated