All credits to: Nala – Instagram Iota.news – Original post: https://goo.gl/a5JQRx
The adoption of ternary numeral system has been validated as means to lower power consumption for IoT processors.
Instead of the Elliptic Curve Cryptography (ECC), IOTA adopts Hash signature, which is not only faster, but also greatly simplifies the whole protocol (signature & verification). IOTA is Quantum Resistant thanks to the use of Vin G Nitsch signature. For each transaction, a seed private key is used to create a new private key and the address is secured with a Hash signature. Even if quantum computers are able to solve this private key through parallel computing, it will be of no significance, as theoretically it can be used for only once.
Application Novelty: Tangle is highly efficient, considering the absence of mining and ledger-updating in IOTA and the low computational load needed to confirm only two transactions. Also, micro payment is made possible by zero service fees. This technical solution is well received by industrial enterprises dealing in connected equipment and enjoys a bright prospect in the IoT sector.
Technical Maturity: Distinct from most DLT projects, IOTA chooses a technically sharp DLT that has already has several use cases . Leading enterprises across the world, large, medium, or small-sized, are using IOTA and other blockchain technologies to advance their digital transformation, particularly in Germany. Various German firms have adopted IOTA to Mobility, Energy Supply, and Data Security, etc.
Flash Channel and MAM (Masked Authenticated Messaging) make up the modularized IOTA. These two modules will be important to many teams in their future efforts to exploit applications and start businesses. Flash channel is similar to the lightening network for Bitcoin and Raiden network for Ethereum, plus it’s formal network is already in operation. MAM is the mask code verification signal, the most crucial element for IoT data application.
Source:mp.weixin. qq. com