Introducing the Proof of Scan Protocol for Smart Contracts and dApps

Written by 3dpass | Published 2023/02/09
Tech Story Tags: blockchain | blockchain-protocols | asset-tokenization | dapp-development | smart-contracts | web3 | good-company | blockchain-development | hackernoon-es | hackernoon-hi | hackernoon-zh | hackernoon-vi | hackernoon-fr | hackernoon-pt | hackernoon-ja

TLDRProof of Scan (PoScan) is the consensus mechanism for the 3DPass blockchain network. PoScan operates under the rule "One object = One asset" and uses a recognition algorithm known as Grid2d to authenticate 3D objects. In PoScan, miners must guess a unique-shaped 3D object and the HASH ID.via the TL;DR App

Introducing Proof of Scan: the revolutionary decentralized protocol that not only serves as the consensus mechanism for the 3DPass blockchain network, but also prevents digital assets from being copied. This cutting-edge approach opens the door to trillions of dollars in global deals by tokenizing a wide range of objects, including 3D models, 2D drawings, melodies, voices, and radio signals.

But how does it work? To understand, let's compare Proof of Scan (PoScan) to the more familiar Proof of Work (PoW) used in many cryptocurrencies.

“One object = One asset” rule

PoScan operates under the rule "One object = One asset" and uses a recognition algorithm known as Grid2d to authenticate 3D objects, unlike traditional hash functions like SHA256 which can only authenticate text or files.

SHA256

any text or file — > SHA256 — > a hash inherent to the exact text or file

  • The chain from an object to its SHA256 hash is broken. SHA256 hash doesn’t have to do with anything real or representing value.

  • The SHA256 hash is going to remain the same, if the text or file is the same. Had you changed the file or text with one symbol or one byte, the output would have changed dramatically, even though it was still the same object (a picture with the same image on it, the same 3D model with just one dot on the surface, the same piece of music with 1 sec plus, etc). SHA256 has no control over the object’s copies, it knows nothing about their existence.

Grid2d

3D model in *.obj *format -> Grid2d -> HASH ID (a list of hashes inherent to the object shape)

  • The hashes will match, if the object shape is considered to be the same within the error of resolution, which is possible to set up by means of the recognition parameters. In other words, irrespective to how many dots you put on the surface, the HASH ID would still have matched until you damage the object shape enough.

Play around 3dpass mobile wallet to get some practice.

It becomes obvious that using the recognition algorithm allows for authentication of nothing, but the object itself, while the regular SHA256 can only authenticate an exact text line or file. That is the crucial point to understand before moving on.

Mining and block seal

The mining and block-sealing process also differs from PoW. In PoW, miners compete to find a "nonce" value that, when added to the parent block hash, produces a specific output (ex. SHA256 output, which is below the limit called Difficulty) like this “0000000000000756af69e2ffbdb930261873cd71“.

In PoScan, miners must guess a unique-shaped 3D object, and the HASH ID of that object is sealed to the parent block hash using SHA256 (learn the details) in a similar to PoW way (Difficulty limit is leveraged). This ensures that only unique and original objects are stored on the blockchain, providing asset copy protection and making the 3DPass blockchain the "Ledger of Unique Things."

Deterministic finality

Additionally, PoScan provides deterministic finality, giving users the assurance that their tokenized assets will always be safe and secure. This makes it an ideal choice for dApp developers looking to protect and monetize their digital assets.

Probabilistic finality in PoW

In conventional PoW (Proof of Work) consensus (ex. Satoshi Nakamoto, which first was applied in Bitcoin), it is allowed for several legitimate chains to grow up simultaneously, and the longest chain wins the competition. Therefore, there’s always a chance for the best chain (the longest one) to be reorganized as a result of miners’ competition. This leads to the potential situation of losing control over the assets stored on the blocks that happened to get in the fork and eventually ended up useless. These situations are out of user control on Bitcoin, Ethereum (PoW), etc.

Deterministic finality in PoScan

PoScan (Proof of Scan) is equipped with GRANDPA deterministic finality PoA (Proof of Authority) protocol in addition. There is an Authority set called Validators consisting of the most reliable nodes originally selected from out of miners — authors produced at least one block in the 100–8000 most recent blocks looking back. They vote upon the best chain, and after all voting rounds are complete there will be no chance for the finalized chain to get reorganized (2/3 + 1 positive votes is enough to make the final decision).

Scalability

PoScan is designed to support a number of different recognition algorithms which would be the best fit for the particular industry or business process. Grid2d algorithm was developed as the first one that suits just 3D objects. Expanding pass3d open source recognition library with new algorithms leads to the potential ability of tokenization such objects as: 3D models, 2D drawings, melodies, voices, and radio signals, etc**.**

Smart contracts and dApps

Leveraging PoScan protocol opens the gateway to endless of potential implementations in decentralized world. In simple words, developers now can tether objects to smart contracts and dApps with one-to-one correspondence and protect digital assets from copying.

Property rights borders are proved by math calculations and always defined by means of recognition parameters set up for each particular asset or group of assets. Multi-object option makes assets useful even offline, providing zero knowledge about the actual object properties.

3D or 2D art creators could sell their work as copy-protected non-fungible or fungible tokens tethered to art object identity (HASH ID). Music could be sold p2p by pieces, as well (one track = one asset).

Some real objects could be tokenized and turned into backed digital currency, ex. diamonds/carats. Objects could be converted into limited supply users’ assets in different games, VR/AR, Metaverse.

That was a small introduction of Proof of Scan protocol. Stay tuned!

I hope you'll enjoy 3dpass as much as I do and create the best dApps ever!

White Paper

GitHub

Web site: https://3dpass.org/


Written by 3dpass | Layer 1 blockchain platform for the tokenization of objects. Proof of Scan protocol, useful smart contracts and dApps.
Published by HackerNoon on 2023/02/09