V E C T O R I U M F L A S H€¦ · Title: Lightpaper Vect Author: Gerjon Hodaj Keywords:...

8
VECTORIUM FLASH LIGHTPAPER 2019 | OCTOBER Green mineable virtual currency Based on Zcash 2.0 SUMMARY Vectorium flash is the first crypto coin that can only be mined with green power SHORT DETAILS Slow emission and fair solo mining generation, Vectorium Flash it's based on the latest codebase implementing sapling and overinter security support. A faster blocktime allows you to send and receive in a matter of milliseconds

Transcript of V E C T O R I U M F L A S H€¦ · Title: Lightpaper Vect Author: Gerjon Hodaj Keywords:...

Page 1: V E C T O R I U M F L A S H€¦ · Title: Lightpaper Vect Author: Gerjon Hodaj Keywords: DADpmIU4L9s,BADk2YllBvU Created Date: 10/30/2019 7:50:39 AM

VECTORIUM FLASH

LIGHTPAPER2019 | OCTOBER

Green mineable virtual currency

Based on Zcash 2.0

SUMMARYVectorium flash is

the first cryptocoin that can only

be mined withgreen power

SHORT DETAILSSlow emission and fair solo mining generation,

Vectorium Flash it's based on the latestcodebase implementing sapling and overinter

security support. A faster blocktime allows youto send and receive in a matter of milliseconds

Page 2: V E C T O R I U M F L A S H€¦ · Title: Lightpaper Vect Author: Gerjon Hodaj Keywords: DADpmIU4L9s,BADk2YllBvU Created Date: 10/30/2019 7:50:39 AM

WHAT IS VECTORIUM FLASH AND WHAT'S THETECHNOLOGY BEHIND

Vectorium Flash is a mineable coin based on a whole new blockchain technology.It ’s the core asset of the new Crypto Energy project that will lead us into a new era. Vectorium Flash is an equihash based coin mineable from everyone, and it ’s based onthe latest Zcash 2.0 codebase implementing sapling and overwinter security support.A faster blocktime allows you to send and receive coins in a matter of mill iseconds.

LIGHTPAPER2019 | OCTOBER

VECTORIUM FLASH TRANSPARENT AND SHIELDEDADRESSES EXPLAINED

Transparent addresses on the Vectorium protocol are equivalent to public addresseson the Bitcoin protocol, and thus, function in much same way. All transparentaddresses, during a transaction, interact with what is known as the Transparent ValuePool, or TVP for short. The TVP is what publicly reveals transaction data, allowing itto be viewed on the Vectorium blockchain by anyone. Shielded addresses on the other hand, encrypts transaction data and requires thegeneration of zk-SNARKs in order to verify the transaction’s validity. Shieldedaddresses bring an increased level of privacy and security compared to transparentaddresses.

Page 3: V E C T O R I U M F L A S H€¦ · Title: Lightpaper Vect Author: Gerjon Hodaj Keywords: DADpmIU4L9s,BADk2YllBvU Created Date: 10/30/2019 7:50:39 AM

LIGHTPAPER2019 | OCTOBER

WHAT ABOUT ZK-SNARKS?Vectorium Flash isn’t the first widespread application of zk-SNARKs, it was firstlyintrodouced from ZCash, a novel form of zero-knowledge cryptography. The strongprivacy guarantee of Vectorium Flash is derived from the fact that shieldedtransactions in of Vectorium Flash can be fully encrypted on the blockchain, yet stil lbe verified as valid under the network’s consensus rules by using zk-SNARK proofs.The acronym zk-SNARK stands for “Zero-Knowledge Succinct Non-InteractiveArgument of Knowledge,” and refers to a proof construction where one can provepossession of certain information, e.g. a secret key, without revealing thatinformation, and without any interaction between the prover and verifier. “Zero-knowledge” proofs allow one party (the prover) to prove to another (the verifier)that a statement is true, without revealing any information beyond the validity of thestatement itself. For example, given the hash of a random number, the prover couldconvince the verifier that there indeed exists a number with this hash value, withoutrevealing what it is. In a zero-knowledge “Proof of Knowledge” the prover can convince the verifier notonly that the number exists, but that they in fact know such a number – again,without revealing any information about the number. The difference between “Proof”and “Argument” is quite technical and we don’t get into it here. “Succinct” zero-knowledge proofs can be verified within a few milliseconds, with aproof length of only a few hundred bytes even for statements about programs thatare very large. In the first zero-knowledge protocols, the prover and verifier had tocommunicate back and forth for multiple rounds, but in “non-interactive”constructions, the proof consists of a single message sent from prover to verifier. Currently, the most efficient known way to produce zero-knowledge proofs that arenon-interactive and short enough to publish to a block chain is to have an initialsetup phase that generates a common reference string shared between prover andverifier. We refer to this common reference string as the public parameters of thesystem.Creating shielded transactions in Zcash is only one example out of many possibleapplications of zk-SNARKs. Theoretically, you can use a zk-SNARK to verify anyrelation without disclosing inputs or leaking information.

Page 4: V E C T O R I U M F L A S H€¦ · Title: Lightpaper Vect Author: Gerjon Hodaj Keywords: DADpmIU4L9s,BADk2YllBvU Created Date: 10/30/2019 7:50:39 AM

LIGHTPAPER2019 | OCTOBER

WHAT IS SAPLING?Sapling is a network upgrade that introduces significant efficiency improvements forshielded transactions that will pave the way for broad mobile, exchange and vendoradoption of VectoriumFlash shielded addresses.

PERFORMANCE FOR SHIELDED ADDRESSESPayments involving the new Sapling z-addresses can be constructed in as little as afew seconds and with only 40 megabytes of memory.

DECOUPLED SPEND AUTHORITYAllows the hardware that constructs the zero-knowledge proof to be independentfrom the hardware that signs for the transaction.

IMPROVED KEYSFull viewing keys allow owners of shielded addresses the ability to view incoming andoutgoing transaction details without exposing their private spending key.

WHAT IS OVERWINTER?Overwinter, firstly introduced from Zcash is the first network upgrade for VectoriumFlash. Its purpose is strengthening the protocol for future network upgrades.It includes versioning, replay protection for network upgrades, performanceimprovements for transparent transactions, a new feature of transaction expiry, andmore.

Page 5: V E C T O R I U M F L A S H€¦ · Title: Lightpaper Vect Author: Gerjon Hodaj Keywords: DADpmIU4L9s,BADk2YllBvU Created Date: 10/30/2019 7:50:39 AM

LIGHTPAPER2019 | OCTOBER

WHAT IS EQUIHASH WITH 192.7 ALGOVARIANT?

Developed by Alex Biryukov and Dmitry Khovratovich at the University of Luxembourg,the Equihash algorithm is an asymmetric memory-orientated proof-of-work systemthat is based on the generalized birthday problem. Equihash is memory-orientated in that it is ‘memory-hard’, meaning that the amountof proof-of-work mining that can be done is predominantly determined by how muchmemory i.e. RAM that one possesses. In other words, memory-hard refers to asituation in which the time taken to complete a given computational problem isprimarily decided by the amount of memory required to hold data. The Equihash algorithm can be viewed as an attempt to curb ASIC miningcentralization, which is why the Equihash algorithm is often referred to as beingASIC-resistant. The algorithm prevents ASIC centralization by ensuring that the generation of a proofis memory-intensive. Because memory is an expensive resource in computing, optimizing for memory on anASIC chip will come at a large computational cost to the user. For example, asBiryukov and Khovratovich noted, the majority of desktops and laptops at market canhandle 1GB of RAM, whereas 1GB of memory on a chip is expensive. Thus, the use ofASIC chips on the Equihash algorithm is intended to be less efficient and powerfulwhen compared to mining on memoryless algorithms. Equihash is also described as being asymmetric. This is significant because, a keyfeature of existing proof-of-work systems such as Bitcoin is that the proofs that arecomputed are difficult to prove but easy to verify. Most memory-hard schemes do not offer memory asymmetry (they are memorysymmetrical), which means that a verifier must use the same amount of memory as the prover in order to validate a proof. Effectively, the verifier would have to be almost as powerful as the prover. Vectorium Flash uses the 192_7 equihash variant, which requires atleast 4GB ofavailable RAM space for processing and validate new blocks, definetly kicking offASICs and FPGAs.

WHAT’S THE BENEFITS OF VECTORIUM FLASHVectoriumFlash was born to unleash the full power of blockchain transactions, atlightning speeds, with a whole new solo mining system we were able to provide afully distribuited mining process.In this days cryptocurrency mining requires a high electricity cost, above all during abear market. Basically Vectorium Flash is not a speculation coin but a coin with afixed valued related to electricity.

Page 6: V E C T O R I U M F L A S H€¦ · Title: Lightpaper Vect Author: Gerjon Hodaj Keywords: DADpmIU4L9s,BADk2YllBvU Created Date: 10/30/2019 7:50:39 AM

LIGHTPAPER2019 | OCTOBER

Super fast transactions (less than 0.12 millisecond in order to have your coins confirmed!) Dedicate solo mining system on community pools Born to resist big farms, FPGAs and ASICs pool hoppers Crypto Carbon Credits Certificates

CRYPTO CARBON CREDITS AND CERTIFICATES Being part of Vectorium's Ecosystem will allow you to buy or trade Crypto CarbonCredits Certificates. These can be generated by holding and validating yourVectorium Flash (VECT). These certficates can be exchanged in the global ETSmarket. A carbon credit is a term to identify any tradable certificate or permit representingthe right to emit one tonne of carbon dioxide or the equivalent amount of a differentgreenhouse gas (tCO2e). Carbon credits and carbon markets are a component of national and internationalattempts to mitigate the growth in concentrations of greenhouse gases (GHGs). Onecarbon credit is equal to one tonne of carbon dioxide, or in some markets, carbondioxide equivalent gases. Carbon trading is an application of an emissions tradingapproach. Greenhouse gas emissions are capped and then markets are used toallocate the emissions among the group of regulated sources. The goal is to allow market mechanisms to drive industrial and commercialprocesses in the direction of low emissions or less carbon intensive approaches thanthose used when there is no cost to emitting carbon dioxide and other GHGs into theatmosphere. Since GHG mitigation projects generate credits, this approach can beused to finance carbon reduction schemes between trading partners and around theworld. Regarding the whole Vectorium Project a website which allows you to generatetrusted Carbon Certificates will be soon available. A Certificate can be created bydepositing and signing specific amounts of coins using a guided procedure.

Page 7: V E C T O R I U M F L A S H€¦ · Title: Lightpaper Vect Author: Gerjon Hodaj Keywords: DADpmIU4L9s,BADk2YllBvU Created Date: 10/30/2019 7:50:39 AM

LIGHTPAPER2019 | OCTOBER

HOW TO MINE VECTORIUM FLASHThe easy way to collect vectorium is to mine vectorium Flash using one or moregraphic cards (GPU) • Ticker: VECT• Algorithm: Vectorium Equihash (192,7)• Max supply:Unlimited• Block Interval: 30 seconds• Coins for block: 10 Transaction Confirmation: 10 Blocks• Coin Maturity: 100 Blocks Vectorium has a built-in mining and PoW system wich requires solid and stable RAMusage definetly kicking out big ASIC farms. We choosed an high intensity algo inorder to maintain high solo mining rewards for l ittle miners: our goal is to spread thecommunity hashrate to generate a stable income for every user. Compared to anEquihash coin, mining is possible only through solo pool mining. This choice was taken in order to make the coin as distributed as possible, stemmingthe centralization of mining farms and benefiting small miners. The process it is quite easy, after creating an online wallet or client wallet, the minercan get vectorium mining a block. Small miners will be advantaged to undermine vectorium for the following reasons: • For each address a limited hashrate similar to a 6 1080 ti mining. You can minewith more than one address, but we will double check the IP origin if your globalhashrate would be too high; • When you find a block, you as a miner can be paused for a fix time. You will nolonger minefor a limited time and the blocks will be distributed to other new miners.When you will put in pause you will be able to mine a different coin or just reducingyour electric consumption waiting new blocks. The more miners join vectorium, the more time you will have to wait after you find avectorium block. (Please note that the solo mining system for Vectorium is continuously underdevelopment and may be subject to drastical changes)

Page 8: V E C T O R I U M F L A S H€¦ · Title: Lightpaper Vect Author: Gerjon Hodaj Keywords: DADpmIU4L9s,BADk2YllBvU Created Date: 10/30/2019 7:50:39 AM

LIGHTPAPER2019 | OCTOBER

• You can dual mining with other cryptocurrency when you are waiting newvectorium blocks;• In future, you can reduce your electricity costs using Vectorium Flash.Vectorium’s miner and the mining guide will be release directly to the solo poolwebsite. There's also plans to develop specific low energy consumption FPGA miners forVECT algorithm, but long time will pass before any of these will be actuallyeingeneered, tested and delivered.