Public Chain DIGITAL - HI TECH (DHT)
The DIGITAL - HI TECH (DHT) Chain is a high performance public chain fully developed by the DIGITAL - HI TECH (DHT) team. It is compatible with both TVM and WASM Smart Contracts and has a two-layer structure consisting of a customizable root chain and subchain. The parent chain is primarily responsible for data synchronization with subchains and DHT token transactions, while the subchain allows businesses to develop their own DApps and blockchain ecosystems. This allows businesses to independently issue and distribute tokens, facilitate Smart Contract and Pipeline deployment, and enable asset exchange and value sharing. reputation across multiple chains.
The DIGITAL - HI TECH (DHT) chain prioritizes efficiency when it comes to consensus selection - an improved PBFT was implemented as a consensus mechanism for both parent and child chains during the DIGITAL - HI TECH (DHT) Testnet 1.0 phase. The original chains will also be gradually improved through the application of linking the DPOS mechanism with the reputation protocol.
The technologies behind the DIGITAL - HI TECH (DHT) Chain are based on an improved version of the traditional PBFT consensus mechanism and the DPOS consensus mechanism, promoting the adoption of multi-party signatures and thus being able to combine benefits benefits of the DPOS consensus mechanism to improve the efficiency of the DIGITAL - HI TECH chain.
(DHTS) The improved efficiency of DIGITAL - HI TECH Series (DHT) is not only reflected in TPS benchmarks but also in network storage and transmission. With the original PBFT protocol, participants were required to transmit signer details to the leader, before the leader could integrate the details into the block header. With the implementation of multi-party signatories, this process can be greatly improved. The DIGITAL - HI TECH (DHT) chain uses the Schnorr Multi-Signature Algorithm, based on the Secp256k1 elliptic curve, allowing a unique signature to be generated. Thus, this significantly reduces the signature length and thus the size of the block header, while minimizing storage and network transmission costs. According to DPOS mechanism, the evil node can be deleted to make the network more stable and secure.
Illustration of the technical structure of DHT:
Last updated