Symmetric encryption requires two keys: a public key and a private key. The two keys work in pair. The data encrypted with the public key can only be decrypted with the corresponding private key. As encryption and decryption require two different keys, this algorithm is called asymmetric encryption. The procedure…


The digital ownership refers to the mapping of ownership of physical objects or valued assets in real world into the digital world. …


Consortium blockchain is only for members of a particular group and limited third parties. Internally, some pre-elected nodes are designed as bookkeepers based on certain criteria, and the generation of each block is jointly decided by all pre-elected nodes. Other nodes access to consortium blockchain can participate in transaction but…


However, from the monetary category, the third-party payment corresponds to digitized RMB in M1 and M2 levels, among which the funds deposited in the reserve account by Alipay and WeChat Pay are M1, while money funds purchased by users are M2. Neither does the third-party payment have the legal effect…


In November 2015, the FCA (Financial Conduct Authority) initially proposed the idea of Regulatory Sandbox. As a secure test zone under supervision with restrictive conditions and risk management measures, the Regulatory Sandbox allows enterprises to test their innovative products, services and business models in real market environment with real individuals…


Cloud storage is the archiving, organizing and distribution of data consolidated in virtualized storage tapes of various physical hardware. In short, it is to store the data somewhere that can be accessed by anyone as long as they have corresponding permissions.

Virtualized technology will create storage spaces from physical hardware…


At present, the dispute over Layer 1 and Lay 2 solutions on scaling of Ethereum public chain remains controversial. It is believed in the industry that, no matter how we emphasis on the advantages of Layer 2 solution, it is still a compromise in nature to balance the benefits of…


Privacy computing is a combination of technique and system participated by two or more parties to collaborate on machine learning and analysis on the data under the precondition of not revealing any of their respective data.

The parties involved in privacy computing can be either departments from a same organization…


The concept of smart contract was initially proposed by Nick Szabo in 1995.

The objectives of smart contracts are a safer method which is superior than traditional contracts, as well as the reduction of transaction costs related to agreements.

The digital form of smart contracts means that they have to be written into readable code of computers. Until the parties made a certain agreement with specified rights and obligations involved, a computer or a computer network will automatically execute the smart contract. The principal functions of community governance and incentive mechanisms of CUN are driven and implemented by smart contracts.

Follow us

Website:https://coopunion.net

Medium:https://coopunionnetwork.medium.com

Twitter:https://twitter.com/CUNFans

Telegram: https://t.me.cuncommunitycn

Contact:Coopunionnetwork@gmail.com

Coopunion Network

Coopunion Network(CUN) is an open blockchain network committed to providing infrastructure for cooperative economy.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store