Page cover image

🪙Caracteristics SMART MUSIC

SMART is music's private lysed blockchain, a partner where the currency and all its technology areborn. Below we will detail all the operation, security and privacy that SMART brings to the process.

SMART5 addresses mining, privacy, and openness issues through integrated user permissions management. The central objective is threefold: (a) to ensure that blockchain activity is visible to any participant, introduce controls on which transactions are allowed, and to allow mining to occur safely without proof of work and its associates.

Once a blockchain is private, scale-related problems are easily involved, since chain participants can control the maximum block size. In addition, as a closed system, the blockchain will contain only transactions that are of interesttoparticipating participants. To understand the permissions on SMART we start by noting that all cryptocurrencies randomly generate their own private keys and never reveal them to another participant.

Each private key has a mathematically related public address that represents an identity to receive funds. Once sent to a public address, these funds can only be spent using the corresponding private key to "sign" a new transaction. In this sense, access to a private key is equivalent to the ownership of any funds it protects. In addition to controlling access to funds, this type of encryption allows any information to be signed by user to prove that it has the private key corresponding to a particular address. SMART uses this property to restrict blockchain access to a list of allowed users, expanding the handshaking process that occurs when two blockchain nodes connect:

1- Each node presents its identity as a public address in the whitelist.

2- Each node checks whether the other's address is in its own version of the allowed list.

3- Each node sends a challenge message to the other party.

4- Each node sends back a signature of the challenge message, proving its ownership of the private key corresponding to the public address displayed.

If any of the nodes are not satisfied with the results, it aborts the peer to peer connection.

The principle of connecting permissions to public addresses can be extended to many other operations on the network. For example, the right to send and/or receive transactions may be restricted to a certain address list, since transactions reveal the sender addresses of recipients. Because transactions can have multiple senders and recipients, a transition is only allowed if all of your senders and recipients are allowed. In fact, in some cases, we may prefer blockchain to be fully visible to the public and only apply restrictions to transaction capability, and this is precisely the case with SMART.

Last updated