Zen Protocol is a blockchain platform designed to support real financial products, offering automation and freedom from central control. It addresses various challenges faced by existing blockchain platforms and introduces innovative solutions. Here’s an overview of what Zen Protocol is and the problems it aims to solve:
Verified contracts. One of the challenges addressed by Zen Protocol is the competition for resources used to secure money transfer in smart contracts. Zen introduces verified contracts that come with proofs about their execution time and functionality. These proofs enable faster compilation and execution, ensuring that contracts never consume resources unless they execute successfully.
Contract lifestyle. Zen contracts follow a pay-per-block lifecycle model, where they pay miners for every block in which they are active. This approach optimises resource usage, as only contracts that can affect the blockchain are cached in memory, and miners are incentivized for caching them.
Chain Security: To secure the blockchain’s transaction history, Zen utilizes a proof of work (POW) mechanism. This ensures that miners invest genuine and indisputable resources, providing security, open access, and incentive compatibility. The POW mechanism helps address concerns related to miner centralization, which is vital for decentralized platforms.
Assets. Zen Protocol supports multiple asset types, and assets can be unlocked with digital signatures. It enables the creation and usage of assets in contracts, facilitating their integration with the Zen-based Lightning Network and other blockchains.
Light client security. The platform prioritises light client security, allowing users on less powerful devices to obtain a good level of security without relying on a centralised source of information. Zen employs techniques like Simplified Payment Verification (SPV) and additional commitments to enable efficient verification of transactions and contract activity.
State control. State control in Zen Protocol is designed to be clear and immutable. Contracts store their state in transaction outputs, and their source code remains unchanged. This simplifies the reasoning about smart contracts and grants rights through cryptographic authentication or possession of tokens.
Overall, Zen Protocol aims to provide a robust blockchain infrastructure that supports real financial products, offers tight integration with Bitcoin, ensures contract verification and efficiency, mitigates miner centralization, enables multiple asset types, provides light client security, and establishes clear state control for smart contracts.
- Bitcoin integration. Zen Protocol watches the Bitcoin network. Anything that happens in the Bitcoin blockchain can trigger contracts on the Zen blockchain. Zen can act as a sidechain to Bitcoin, using a federated peg, collateral deposit, or, in the future, mechanisms like Drivechain. Zen Protocol uses the full Bitcoin consensus, storing a record of the valid Bitcoin chain with most proof of work.
- Multi Hash Mining. Multi Hash Mining is a new way of using many hash functions in Proof of Work mining. Each hash function gets its own difficulty, which adjusts over time to target a hash function ratio. The different hash functions don't have to be used in a set order: if too many blocks are mined using a function then its difficulty increases. Holders of the Zen Native Token can vote to say what the ratio should be. This creates matching incentives for miners and users of the Zen Protocol.
- Oracles. Our oracle solution is fast, efficient, and profitable for oracle operators. Oracles can commit to gigabytes of data in a single, 200-byte transaction. Oracle users then pay the oracle operator for each individual piece of data they want to use. The only data which gets written to the blockchain are those which users pay for.
- Native token use and issuance. Zen's native token is used to activate contracts. Contracts are pay-per-block, meaning they don't use network resources that they don't pay for. The token is also used to vote on what mix of hash functions should be used in Zen Protocol's PoW.
Q3 2016
Q4 2016
Q1 2017
Q2 2017
Q2 2017
Q3 2017
Q4 2017
Q1 2018
Q2 2018
Q3 2018
Verified 0%
Attention. There is a risk that unverified members are not actually members of the team
This offer is based solely on information provided by the offeror and other publicly available sources.
The token sale or exchange event is completely independent of ICOholder. ICOholder is not involved in any way, including technical support or promotion.
We list token sales from entities with which we have no relationship to help users track overall activity within the token sector. This information is not intended as advice, and you should seek professional or specialist guidance or conduct your own due diligence before making any decisions based on our content.
Any terms and conditions regarding token acquisition are solely between contributors and the token issuer. ICOholder is not the seller of these tokens.
ICOholder is not legally responsible for any representations made by third parties about any token sale. Any claims for breach of contract must be directed against the listed token issuing entity.
If you have concerns about the nature, legality, or propriety of a token sale or the involved individuals, please contact info@icoholder.com with detailed information.