<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://en.bitcoin.it/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Godwin</id>
	<title>Bitcoin Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://en.bitcoin.it/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Godwin"/>
	<link rel="alternate" type="text/html" href="https://en.bitcoin.it/wiki/Special:Contributions/Godwin"/>
	<updated>2026-04-21T21:22:42Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=CryptoNight&amp;diff=46516</id>
		<title>CryptoNight</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=CryptoNight&amp;diff=46516"/>
		<updated>2014-04-15T09:19:51Z</updated>

		<summary type="html">&lt;p&gt;Godwin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;CryptoNight is the proof-of-work algorithm used in [[CryptoNote]] and [[Bytecoin|Bytecoin (BCN)]]. It is designed to be egalitarian, being suitable for ordinary PC CPUs, but not the special purpose devices for mining. Therefore, the currencies based on CryptoNight are CPU-mined only.&lt;br /&gt;
&lt;br /&gt;
== Principles ==&lt;br /&gt;
&lt;br /&gt;
CryptoNight relies on random access to the slow memory and emphasizes latency dependence. Each new block depends on all the previous blocks (unlike, for example, [[scrypt proof of work|scrypt]]). The algorithm requires about 2 Mb per instance:&lt;br /&gt;
&lt;br /&gt;
# It fits in the L3 cache (per core) of modern processors.&lt;br /&gt;
# A megabyte of internal memory is almost unacceptable for the modern ASICs.&lt;br /&gt;
# GPUs may run hundreds of concurrent instances, but they are limited in other ways. GDDR5 memory is slower than the CPU L3 cache and remarkable for its bandwidth, not random access speed.&lt;br /&gt;
# Significant expansion of the scratchpad would require an increase in iterations, which in turn implies an overall time increase. &amp;quot;Heavy&amp;quot; calls in a trustless p2p network may lead to serious vulnerabilities, because nodes are obliged to check every new block&#039;s proof-of-work. If a node spends a considerable amount of time on each hash evaluation, it can be easily DDoSed by a flood of fake objects with arbitrary work data (nonce values).&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
&lt;br /&gt;
* [[Bytecoin]]&lt;br /&gt;
* [[CryptoNote]]&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://cryptonote.org/inside.php#equal-proof-of-work CryptoNight on CryptoNote&#039;s website]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Alternative cryptocurrencies]]&lt;br /&gt;
[[Category:Digital currencies]]&lt;br /&gt;
[[Category:Technical]]&lt;/div&gt;</summary>
		<author><name>Godwin</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=CryptoNight&amp;diff=46515</id>
		<title>CryptoNight</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=CryptoNight&amp;diff=46515"/>
		<updated>2014-04-15T09:18:45Z</updated>

		<summary type="html">&lt;p&gt;Godwin: /* Principles */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;CryptoNight is the proof-of-work algorithm used in [[CryptoNote]] and [[Bytecoin|Bytecoin (BCN)]]. It is designed to be egalitarian, being suitable for ordinary PC CPUs, but not the special purpose devices for mining. Therefore, the currencies based on CryptoNight are CPU-mined only.&lt;br /&gt;
&lt;br /&gt;
== Principles ==&lt;br /&gt;
&lt;br /&gt;
CryptoNight relies on random access to the slow memory and emphasizes latency dependence. Each new block depends on all the previous blocks (unlike, for example, [[scrypt proof of work|scrypt]]). The algorithm requires about 2 Mb per instance:&lt;br /&gt;
&lt;br /&gt;
# It fits in the L3 cache (per core) of modern processors.&lt;br /&gt;
# A megabyte of internal memory is almost unacceptable for the modern ASICs.&lt;br /&gt;
# GPUs may run hundreds of concurrent instances, but they are limited in other ways. GDDR5 memory is slower than the CPU L3 cache and remarkable for its bandwidth, not random access speed.&lt;br /&gt;
# Significant expansion of the scratchpad would require an increase in iterations, which in turn implies an overall time increase. &amp;quot;Heavy&amp;quot; calls in a trustless p2p network may lead to serious vulnerabilities, because nodes are obliged to check every new block&#039;s proof-of-work. If a node spends a considerable amount of time on each hash evaluation, it can be easily DDoSed by a flood of fake objects with arbitrary work data (nonce values).&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
&lt;br /&gt;
* [[Bytecoin]]&lt;br /&gt;
* [[CryptoNote]]&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://cryptonote.org/inside.php#equal-proof-of-work CryptoNight on CryptoNote&#039;s website]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Alternative cryptocurrencies]]&lt;br /&gt;
[[Category:Digital currencies]]&lt;/div&gt;</summary>
		<author><name>Godwin</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=CryptoNight&amp;diff=46514</id>
		<title>CryptoNight</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=CryptoNight&amp;diff=46514"/>
		<updated>2014-04-15T09:18:14Z</updated>

		<summary type="html">&lt;p&gt;Godwin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;CryptoNight is the proof-of-work algorithm used in [[CryptoNote]] and [[Bytecoin|Bytecoin (BCN)]]. It is designed to be egalitarian, being suitable for ordinary PC CPUs, but not the special purpose devices for mining. Therefore, the currencies based on CryptoNight are CPU-mined only.&lt;br /&gt;
&lt;br /&gt;
== Principles ==&lt;br /&gt;
&lt;br /&gt;
CryptoNight relies on random access to the slow memory and emphasizes latency dependence. Each new block depends on all the previous blocks (unlike, for example, [[scrypt|scrypt proof of work]]). The algorithm requires about 2 Mb per instance:&lt;br /&gt;
&lt;br /&gt;
# It fits in the L3 cache (per core) of modern processors.&lt;br /&gt;
# A megabyte of internal memory is almost unacceptable for the modern ASICs.&lt;br /&gt;
# GPUs may run hundreds of concurrent instances, but they are limited in other ways. GDDR5 memory is slower than the CPU L3 cache and remarkable for its bandwidth, not random access speed.&lt;br /&gt;
# Significant expansion of the scratchpad would require an increase in iterations, which in turn implies an overall time increase. &amp;quot;Heavy&amp;quot; calls in a trustless p2p network may lead to serious vulnerabilities, because nodes are obliged to check every new block&#039;s proof-of-work. If a node spends a considerable amount of time on each hash evaluation, it can be easily DDoSed by a flood of fake objects with arbitrary work data (nonce values).&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
&lt;br /&gt;
* [[Bytecoin]]&lt;br /&gt;
* [[CryptoNote]]&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://cryptonote.org/inside.php#equal-proof-of-work CryptoNight on CryptoNote&#039;s website]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Alternative cryptocurrencies]]&lt;br /&gt;
[[Category:Digital currencies]]&lt;/div&gt;</summary>
		<author><name>Godwin</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=CryptoNote&amp;diff=46513</id>
		<title>CryptoNote</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=CryptoNote&amp;diff=46513"/>
		<updated>2014-04-15T09:18:12Z</updated>

		<summary type="html">&lt;p&gt;Godwin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;CryptoNote is an open-source technology that allows creation of completely anonymous CPU-based cryptocurrencies. It proposes concepts and features, which haven&#039;t become mainstream in the altcoins yet. The only known digital currency to be based on CryptoNote is [[Bytecoin|Bytecoin [BCN]]].&lt;br /&gt;
&lt;br /&gt;
== Features == &lt;br /&gt;
&lt;br /&gt;
=== Untraceable payments ===&lt;br /&gt;
&lt;br /&gt;
Unlike traditional cryptocurrencies that mostly use unambiguous signatures to verify the transfer, CryptoNote utilizes ring signature. In this case the transaction is signed by a group of users. Thus, the verifier may only identify that one of them was a signer, but not who exactly that was. The public key of a user may appear in a large number of ring signatures even if it was already used to sign her own transaction.&lt;br /&gt;
&lt;br /&gt;
=== Unlinkable transactions ===&lt;br /&gt;
&lt;br /&gt;
CryptoNote automatically creates multiple unique one-time addresses for each of the payments, which are created from the single public key. Even though the payment is sent to a public address, in the block chain it appears as if sent to a one-time address.&lt;br /&gt;
&lt;br /&gt;
The sender uses randam data and the public address of the receiver to calculate this one-time key of the payment. The redemption of the funds requires the receiver&#039;s private key, so only the latter may receive the money sent to the one-time address. Moreover, no third party can discover the link between the one-time key and the receiver&#039;s public address.&lt;br /&gt;
&lt;br /&gt;
=== Double-spending proof ===&lt;br /&gt;
&lt;br /&gt;
In spite of being anonymous, CryptoNote&#039;s ring signatures restrict the double-spending attempt by linking the transactions with the same private key. The protocol uses the key image, derived from a private key through a one-way function. All the users keep the list of all the used key images, which are checked against a new transaction. In case there is a duplicate key image, the transaction is rejected as a double-spending attempt. However, the identity of the sender would still be unknown, since it is impossible to get the private key from its image.&lt;br /&gt;
&lt;br /&gt;
=== Block chain analysis resistance === &lt;br /&gt;
&lt;br /&gt;
CryptoNote creates an obstacle for an analyst by using ring signatures and one-time addresses covered above. Every address of the payment is a unique one-time key, which is created from both the sender&#039;s and the receiver&#039;s data, and the usage of ring signature hides the exact outputs that have been spent for the input. Therefore, each next transaction increases the number of possible senders and hides the actual connection even more.&lt;br /&gt;
&lt;br /&gt;
=== Adaptive limits === &lt;br /&gt;
&lt;br /&gt;
There are no hard constants and magic numbers in CryptoNote. Each limit (e.g., max block size, or min fee amount) is re-calculated based on the historical data of the system. Moreover, the difficulty and the max block size are automatically adjusted with each new block.&lt;br /&gt;
&lt;br /&gt;
=== Smooth emission ===&lt;br /&gt;
&lt;br /&gt;
The coins are emitted smoothly, as the reward changes with each new block. This allows a predictable steady growth of money supply determined by the formula&amp;lt;ref&amp;gt;hhttps://cryptonote.org/inside.php#smooth-emission&amp;lt;/ref&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
 BaseReward = (MSupply - A) &amp;gt;&amp;gt; 18&lt;br /&gt;
 MSupply = 2^64 - 1 (atomic units)&lt;br /&gt;
&lt;br /&gt;
=== Egalitarian proof of work ===&lt;br /&gt;
&lt;br /&gt;
CryptoNote uses [[CryptoNight]] hashing algorithm as its proof-of-work. Its main feature is that it is suitable only for the ordinary PCs, since CryptoNight utilizes built-in CPU instructions, which are too expensive to implement in the special purpose devices. Therefore, unlike Bitcoin, it allows preserving the equality among various users and prohibits centralization of the network in the hands of several miners.&lt;br /&gt;
&lt;br /&gt;
== Origins ==&lt;br /&gt;
&lt;br /&gt;
Little is known about CryptoNote&#039;s origins. The official website uses supposedly fake names for the team members, while the white paper&#039;s author is Nicolas van Saberhagen, which is also likely to be a pseudonym. The white paper &amp;quot;CryptoNote v 2.0&amp;quot; is dated back to October 2013&amp;lt;ref&amp;gt;https://cryptonote.org/whitepaper.pdf&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The developers have mentioned at CryptoNote&#039;s official forum that the team actually consists of cryptographers, developers, and economists, but their identities have to be concealed currently&amp;lt;ref&amp;gt;https://forum.cryptonote.org/viewtopic.php?f=3&amp;amp;t=21#p61&amp;lt;/ref&amp;gt;. It was also mentioned that CryptoNote&#039;s team and Bytecoin&#039;s team have been developing the technology and the currency in a cooperation, but separated soon after the launch&amp;lt;ref&amp;gt;https://forum.cryptonote.org/viewtopic.php?f=3&amp;amp;t=21#p73&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
CryptoNote is likely to have been under development for some time before Bytecoin&#039;s launch (July 2012), but there is no evidence of the exact years of R&amp;amp;D. CryptoNote&#039;s website mentions &amp;quot;2011—2014&amp;quot; in the footer.&lt;br /&gt;
&lt;br /&gt;
== Implementation ==&lt;br /&gt;
&lt;br /&gt;
The first alternate currency to be based on CryptoNote is [[Bytecoin]]. CryptoNote forum has a separate branch for those who would like to implement the protocol in another altcoin&amp;lt;ref&amp;gt;https://forum.cryptonote.org/viewtopic.php?f=6&amp;amp;t=7&amp;lt;/ref&amp;gt;. However, the reference code is still Bytecoin&amp;lt;ref&amp;gt;https://forum.cryptonote.org/viewtopic.php?f=6&amp;amp;t=6#p8&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
* [[Bytecoin]]&lt;br /&gt;
* [[CryptoNight]]&lt;br /&gt;
&lt;br /&gt;
== External links ===&lt;br /&gt;
&lt;br /&gt;
* [https://cryptonote.org CryptoNote website]&lt;br /&gt;
* [https://forum.cryptonote.org Official forum]&lt;br /&gt;
* [https://github.com/amjuarez/bytecoin Reference code]&lt;br /&gt;
* [https://cryptonote.org/whitepaper.pdf White paper]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Alternative cryptocurrencies]]&lt;br /&gt;
[[Category:Digital currencies]]&lt;/div&gt;</summary>
		<author><name>Godwin</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=CryptoNight&amp;diff=46512</id>
		<title>CryptoNight</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=CryptoNight&amp;diff=46512"/>
		<updated>2014-04-15T09:16:11Z</updated>

		<summary type="html">&lt;p&gt;Godwin: /* External Links */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;CryptoNight is the proof-of-work algorithm used in [[CryptoNote]] and [[Bytecoin|Bytecoin (BCN)]]. It is designed to be egalitarian, being suitable for ordinary PC CPUs, but not the special purpose devices for mining. Therefore, the currencies based on CryptoNight are CPU-mined only.&lt;br /&gt;
&lt;br /&gt;
== Principles ==&lt;br /&gt;
&lt;br /&gt;
CryptoNight relies on random access to the slow memory and emphasizes latency dependence. Each new block depends on all the previous blocks (unlike, for example, [[scrypt]]). The algorithm requires about 2 Mb per instance:&lt;br /&gt;
&lt;br /&gt;
# It fits in the L3 cache (per core) of modern processors.&lt;br /&gt;
# A megabyte of internal memory is almost unacceptable for the modern ASICs.&lt;br /&gt;
# GPUs may run hundreds of concurrent instances, but they are limited in other ways. GDDR5 memory is slower than the CPU L3 cache and remarkable for its bandwidth, not random access speed.&lt;br /&gt;
# Significant expansion of the scratchpad would require an increase in iterations, which in turn implies an overall time increase. &amp;quot;Heavy&amp;quot; calls in a trustless p2p network may lead to serious vulnerabilities, because nodes are obliged to check every new block&#039;s proof-of-work. If a node spends a considerable amount of time on each hash evaluation, it can be easily DDoSed by a flood of fake objects with arbitrary work data (nonce values).&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
&lt;br /&gt;
* [[Bytecoin]]&lt;br /&gt;
* [[CryptoNote]]&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
* [https://cryptonote.org/inside.php#equal-proof-of-work CryptoNight on CryptoNote&#039;s website]&lt;/div&gt;</summary>
		<author><name>Godwin</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=CryptoNight&amp;diff=46511</id>
		<title>CryptoNight</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=CryptoNight&amp;diff=46511"/>
		<updated>2014-04-15T09:15:40Z</updated>

		<summary type="html">&lt;p&gt;Godwin: Created page with &amp;quot;CryptoNight is the proof-of-work algorithm used in CryptoNote and Bytecoin (BCN). It is designed to be egalitarian, being suitable for ordinary PC CPUs, but n...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;CryptoNight is the proof-of-work algorithm used in [[CryptoNote]] and [[Bytecoin|Bytecoin (BCN)]]. It is designed to be egalitarian, being suitable for ordinary PC CPUs, but not the special purpose devices for mining. Therefore, the currencies based on CryptoNight are CPU-mined only.&lt;br /&gt;
&lt;br /&gt;
== Principles ==&lt;br /&gt;
&lt;br /&gt;
CryptoNight relies on random access to the slow memory and emphasizes latency dependence. Each new block depends on all the previous blocks (unlike, for example, [[scrypt]]). The algorithm requires about 2 Mb per instance:&lt;br /&gt;
&lt;br /&gt;
# It fits in the L3 cache (per core) of modern processors.&lt;br /&gt;
# A megabyte of internal memory is almost unacceptable for the modern ASICs.&lt;br /&gt;
# GPUs may run hundreds of concurrent instances, but they are limited in other ways. GDDR5 memory is slower than the CPU L3 cache and remarkable for its bandwidth, not random access speed.&lt;br /&gt;
# Significant expansion of the scratchpad would require an increase in iterations, which in turn implies an overall time increase. &amp;quot;Heavy&amp;quot; calls in a trustless p2p network may lead to serious vulnerabilities, because nodes are obliged to check every new block&#039;s proof-of-work. If a node spends a considerable amount of time on each hash evaluation, it can be easily DDoSed by a flood of fake objects with arbitrary work data (nonce values).&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
&lt;br /&gt;
* [[Bytecoin]]&lt;br /&gt;
* [[CryptoNote]]&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
* [[https://cryptonote.org/inside.php#equal-proof-of-work]]&lt;/div&gt;</summary>
		<author><name>Godwin</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=CryptoNote&amp;diff=46506</id>
		<title>CryptoNote</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=CryptoNote&amp;diff=46506"/>
		<updated>2014-04-15T09:04:55Z</updated>

		<summary type="html">&lt;p&gt;Godwin: /* Origins */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;CryptoNote is an open-source technology that allows creation of completely anonymous CPU-based cryptocurrencies. It proposes concepts and features, which haven&#039;t become mainstream in the altcoins yet. The only known digital currency to be based on CryptoNote is [[Bytecoin|Bytecoin [BCN]]].&lt;br /&gt;
&lt;br /&gt;
== Features == &lt;br /&gt;
&lt;br /&gt;
=== Untraceable payments ===&lt;br /&gt;
&lt;br /&gt;
Unlike traditional cryptocurrencies that mostly use unambiguous signatures to verify the transfer, CryptoNote utilizes ring signature. In this case the transaction is signed by a group of users. Thus, the verifier may only identify that one of them was a signer, but not who exactly that was. The public key of a user may appear in a large number of ring signatures even if it was already used to sign her own transaction.&lt;br /&gt;
&lt;br /&gt;
=== Unlinkable transactions ===&lt;br /&gt;
&lt;br /&gt;
CryptoNote automatically creates multiple unique one-time addresses for each of the payments, which are created from the single public key. Even though the payment is sent to a public address, in the block chain it appears as if sent to a one-time address.&lt;br /&gt;
&lt;br /&gt;
The sender uses randam data and the public address of the receiver to calculate this one-time key of the payment. The redemption of the funds requires the receiver&#039;s private key, so only the latter may receive the money sent to the one-time address. Moreover, no third party can discover the link between the one-time key and the receiver&#039;s public address.&lt;br /&gt;
&lt;br /&gt;
=== Double-spending proof ===&lt;br /&gt;
&lt;br /&gt;
In spite of being anonymous, CryptoNote&#039;s ring signatures restrict the double-spending attempt by linking the transactions with the same private key. The protocol uses the key image, derived from a private key through a one-way function. All the users keep the list of all the used key images, which are checked against a new transaction. In case there is a duplicate key image, the transaction is rejected as a double-spending attempt. However, the identity of the sender would still be unknown, since it is impossible to get the private key from its image.&lt;br /&gt;
&lt;br /&gt;
=== Block chain analysis resistance === &lt;br /&gt;
&lt;br /&gt;
CryptoNote creates an obstacle for an analyst by using ring signatures and one-time addresses covered above. Every address of the payment is a unique one-time key, which is created from both the sender&#039;s and the receiver&#039;s data, and the usage of ring signature hides the exact outputs that have been spent for the input. Therefore, each next transaction increases the number of possible senders and hides the actual connection even more.&lt;br /&gt;
&lt;br /&gt;
=== Adaptive limits === &lt;br /&gt;
&lt;br /&gt;
There are no hard constants and magic numbers in CryptoNote. Each limit (e.g., max block size, or min fee amount) is re-calculated based on the historical data of the system. Moreover, the difficulty and the max block size are automatically adjusted with each new block.&lt;br /&gt;
&lt;br /&gt;
=== Smooth emission ===&lt;br /&gt;
&lt;br /&gt;
The coins are emitted smoothly, as the reward changes with each new block. This allows a predictable steady growth of money supply determined by the formula&amp;lt;ref&amp;gt;hhttps://cryptonote.org/inside.php#smooth-emission&amp;lt;/ref&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
 BaseReward = (MSupply - A) &amp;gt;&amp;gt; 18&lt;br /&gt;
 MSupply = 2^64 - 1 (atomic units)&lt;br /&gt;
&lt;br /&gt;
=== Egalitarian proof of work ===&lt;br /&gt;
&lt;br /&gt;
CryptoNote uses [[CryptoNight]] hashing algorithm as its proof-of-work. Its main feature is that it is suitable only for the ordinary PCs, since CryptoNight utilizes built-in CPU instructions, which are too expensive to implement in the special purpose devices. Therefore, unlike Bitcoin, it allows preserving the equality among various users and prohibits centralization of the network in the hands of several miners.&lt;br /&gt;
&lt;br /&gt;
== Origins ==&lt;br /&gt;
&lt;br /&gt;
Little is known about CryptoNote&#039;s origins. The official website uses supposedly fake names for the team members, while the white paper&#039;s author is Nicolas van Saberhagen, which is also likely to be a pseudonym. The white paper &amp;quot;CryptoNote v 2.0&amp;quot; is dated back to October 2013&amp;lt;ref&amp;gt;https://cryptonote.org/whitepaper.pdf&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The developers have mentioned at CryptoNote&#039;s official forum that the team actually consists of cryptographers, developers, and economists, but their identities have to be concealed currently&amp;lt;ref&amp;gt;https://forum.cryptonote.org/viewtopic.php?f=3&amp;amp;t=21#p61&amp;lt;/ref&amp;gt;. It was also mentioned that CryptoNote&#039;s team and Bytecoin&#039;s team have been developing the technology and the currency in a cooperation, but separated soon after the launch&amp;lt;ref&amp;gt;https://forum.cryptonote.org/viewtopic.php?f=3&amp;amp;t=21#p73&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
CryptoNote is likely to have been under development for some time before Bytecoin&#039;s launch (July 2012), but there is no evidence of the exact years of R&amp;amp;D. CryptoNote&#039;s website mentions &amp;quot;2011—2014&amp;quot; in the footer.&lt;br /&gt;
&lt;br /&gt;
== Implementation ==&lt;br /&gt;
&lt;br /&gt;
The first alternate currency to be based on CryptoNote is [[Bytecoin]]. CryptoNote forum has a separate branch for those who would like to implement the protocol in another altcoin&amp;lt;ref&amp;gt;https://forum.cryptonote.org/viewtopic.php?f=6&amp;amp;t=7&amp;lt;/ref&amp;gt;. However, the reference code is still Bytecoin&amp;lt;ref&amp;gt;https://forum.cryptonote.org/viewtopic.php?f=6&amp;amp;t=6#p8&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
* [[Bytecoin]]&lt;br /&gt;
* [[CryptoNight]]&lt;br /&gt;
&lt;br /&gt;
== External links ===&lt;br /&gt;
&lt;br /&gt;
* [https://cryptonote.org CryptoNote website]&lt;br /&gt;
* [https://forum.cryptonote.org Official forum]&lt;br /&gt;
* [https://github.com/amjuarez/bytecoin Reference code]&lt;br /&gt;
* [https://cryptonote.org/whitepaper.pdf White paper]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Godwin</name></author>
	</entry>
	<entry>
		<id>https://en.bitcoin.it/w/index.php?title=CryptoNote&amp;diff=46505</id>
		<title>CryptoNote</title>
		<link rel="alternate" type="text/html" href="https://en.bitcoin.it/w/index.php?title=CryptoNote&amp;diff=46505"/>
		<updated>2014-04-15T09:04:37Z</updated>

		<summary type="html">&lt;p&gt;Godwin: Created page with &amp;quot;CryptoNote is an open-source technology that allows creation of completely anonymous CPU-based cryptocurrencies. It proposes concepts and features, which haven&amp;#039;t become mainst...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;CryptoNote is an open-source technology that allows creation of completely anonymous CPU-based cryptocurrencies. It proposes concepts and features, which haven&#039;t become mainstream in the altcoins yet. The only known digital currency to be based on CryptoNote is [[Bytecoin|Bytecoin [BCN]]].&lt;br /&gt;
&lt;br /&gt;
== Features == &lt;br /&gt;
&lt;br /&gt;
=== Untraceable payments ===&lt;br /&gt;
&lt;br /&gt;
Unlike traditional cryptocurrencies that mostly use unambiguous signatures to verify the transfer, CryptoNote utilizes ring signature. In this case the transaction is signed by a group of users. Thus, the verifier may only identify that one of them was a signer, but not who exactly that was. The public key of a user may appear in a large number of ring signatures even if it was already used to sign her own transaction.&lt;br /&gt;
&lt;br /&gt;
=== Unlinkable transactions ===&lt;br /&gt;
&lt;br /&gt;
CryptoNote automatically creates multiple unique one-time addresses for each of the payments, which are created from the single public key. Even though the payment is sent to a public address, in the block chain it appears as if sent to a one-time address.&lt;br /&gt;
&lt;br /&gt;
The sender uses randam data and the public address of the receiver to calculate this one-time key of the payment. The redemption of the funds requires the receiver&#039;s private key, so only the latter may receive the money sent to the one-time address. Moreover, no third party can discover the link between the one-time key and the receiver&#039;s public address.&lt;br /&gt;
&lt;br /&gt;
=== Double-spending proof ===&lt;br /&gt;
&lt;br /&gt;
In spite of being anonymous, CryptoNote&#039;s ring signatures restrict the double-spending attempt by linking the transactions with the same private key. The protocol uses the key image, derived from a private key through a one-way function. All the users keep the list of all the used key images, which are checked against a new transaction. In case there is a duplicate key image, the transaction is rejected as a double-spending attempt. However, the identity of the sender would still be unknown, since it is impossible to get the private key from its image.&lt;br /&gt;
&lt;br /&gt;
=== Block chain analysis resistance === &lt;br /&gt;
&lt;br /&gt;
CryptoNote creates an obstacle for an analyst by using ring signatures and one-time addresses covered above. Every address of the payment is a unique one-time key, which is created from both the sender&#039;s and the receiver&#039;s data, and the usage of ring signature hides the exact outputs that have been spent for the input. Therefore, each next transaction increases the number of possible senders and hides the actual connection even more.&lt;br /&gt;
&lt;br /&gt;
=== Adaptive limits === &lt;br /&gt;
&lt;br /&gt;
There are no hard constants and magic numbers in CryptoNote. Each limit (e.g., max block size, or min fee amount) is re-calculated based on the historical data of the system. Moreover, the difficulty and the max block size are automatically adjusted with each new block.&lt;br /&gt;
&lt;br /&gt;
=== Smooth emission ===&lt;br /&gt;
&lt;br /&gt;
The coins are emitted smoothly, as the reward changes with each new block. This allows a predictable steady growth of money supply determined by the formula&amp;lt;ref&amp;gt;hhttps://cryptonote.org/inside.php#smooth-emission&amp;lt;/ref&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
 BaseReward = (MSupply - A) &amp;gt;&amp;gt; 18&lt;br /&gt;
 MSupply = 2^64 - 1 (atomic units)&lt;br /&gt;
&lt;br /&gt;
=== Egalitarian proof of work ===&lt;br /&gt;
&lt;br /&gt;
CryptoNote uses [[CryptoNight]] hashing algorithm as its proof-of-work. Its main feature is that it is suitable only for the ordinary PCs, since CryptoNight utilizes built-in CPU instructions, which are too expensive to implement in the special purpose devices. Therefore, unlike Bitcoin, it allows preserving the equality among various users and prohibits centralization of the network in the hands of several miners.&lt;br /&gt;
&lt;br /&gt;
== Origins ==&lt;br /&gt;
&lt;br /&gt;
Little is known about CryptoNote&#039;s origins. The official website uses supposedly fake names for the team members, while the white paper&#039;s author is Nicolas van Saberhagen, which is also likely to be a pseudonym. The white paper &amp;quot;CryptoNote v 2.0&amp;quot; is dated back to October 2013&amp;lt;ref&amp;gt;https://cryptonote.org/whitepaper.pdf&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The developers have mentioned at CryptoNote&#039;s official forum that the team actually consists of cryptographers, developers, and economists, but their identities have to be concealed currently&amp;lt;ref&amp;gt;https://forum.cryptonote.org/viewtopic.php?f=3&amp;amp;t=21#p61&amp;lt;/ref&amp;gt;. It was also mentioned that CryptoNote&#039;s team and Bytecoin&#039;s team have been developing the technology and the currency in a cooperation, but separated soon after the launch&amp;lt;ref&amp;gt;https://forum.cryptonote.org/viewtopic.php?f=3&amp;amp;t=21#p73&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
CryptoNote is likely to have been under development for some time before Bytecoin&#039;s launch (July 2012), but there is no evidence of the exact years of R&amp;amp;D. CryptoNote&#039;s website mentions &amp;quot;2011—2014&amp;quot; in a footer.&lt;br /&gt;
&lt;br /&gt;
== Implementation ==&lt;br /&gt;
&lt;br /&gt;
The first alternate currency to be based on CryptoNote is [[Bytecoin]]. CryptoNote forum has a separate branch for those who would like to implement the protocol in another altcoin&amp;lt;ref&amp;gt;https://forum.cryptonote.org/viewtopic.php?f=6&amp;amp;t=7&amp;lt;/ref&amp;gt;. However, the reference code is still Bytecoin&amp;lt;ref&amp;gt;https://forum.cryptonote.org/viewtopic.php?f=6&amp;amp;t=6#p8&amp;lt;/ref&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
&lt;br /&gt;
* [[Bytecoin]]&lt;br /&gt;
* [[CryptoNight]]&lt;br /&gt;
&lt;br /&gt;
== External links ===&lt;br /&gt;
&lt;br /&gt;
* [https://cryptonote.org CryptoNote website]&lt;br /&gt;
* [https://forum.cryptonote.org Official forum]&lt;br /&gt;
* [https://github.com/amjuarez/bytecoin Reference code]&lt;br /&gt;
* [https://cryptonote.org/whitepaper.pdf White paper]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;references/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Godwin</name></author>
	</entry>
</feed>