چكيده لاتين
Blockchain is a new technology that makes it possible to create an immutable ledger. Using a distributed network, this technology receives and executes user requests in the form of transactions. Then it saves the result as an immutable but visible record in the blocks. Blockchain has unique features such as transparency, anonymity, democracy, security, decentralization and no need for a trusted central institution. On public blockchain, it is possible to view transactions for all users, and other users check the information of the templates and confirm the correctness of the transactions after creating the template. As a result, on the one hand, this technology faces the challenge of maintaining privacy, and on the other hand, with the increase in the number of users, the number of transactions, and the size of the chain, in practice there are limitations such as throughput, storage space, and network bandwidth. It creates the challenge of scalability.
In many applications, including payment operations, the speed of responding to users' needs and executing their transactions on public blockchain is very slow compared to existing banking solutions. In recent years, various methods have been presented to increase scalability. In this dissertation, after examining these solutions, the challenges of commit chains as an effective solution have been examined and a proposed plan has been presented to solve the challenges.
The purpose of this research is to provide simpler solutions with higher efficiency, along with preserving the privacy of users and the possibility of quick exit from the chain, without the need to make collateral. So that users can perform their transactions in a simple and fast way by connecting to commit chains; without having to worry about their privacy being violated by different operators in the commit chains. It has also been tried to reduce the need for users to communicate with operators to perform transactions without users having to worry about the security of their property. Due to the lack of a similar case, the security check of the proposed plan has been done with an informal method, and at the end, the security and efficiency of the proposed plan is proven.