Credit Chain Coin White Paper
search
Ctrlk
  • 1.Abstract
  • 2.Vision
  • 3.Technical Architecturechevron-right
  • 4.Proof of Creditchevron-right
    • 4.1 Process
    • 4.2Components of Credit Data
    • 4.3 Computing Processchevron-right
      • 4.3.1 Homomorphic Encryption
      • 4.3.2 Differential Privacy
    • 4.4 Block Writing
    • 4.5 Consensus and Security
  • 5.Proof of Stakechevron-right
  • 6 Credit Data Algorithmschevron-right
  • 7 Data Structure & Encryption Processchevron-right
  • 8 Tokenomicschevron-right
  • 9 Security Measures
  • 10 Use Caseschevron-right
  • 11 Roadmapchevron-right
  • 12 Community & Marketingchevron-right
  • 14 Appendix
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. 4.Proof of Credit

4.3 Computing Process

4.3.1 Homomorphic Encryptionchevron-right4.3.2 Differential Privacychevron-right
Previous4.2Components of Credit Datachevron-leftNext4.3.1 Homomorphic Encryptionchevron-right