Descrption:A person’s Personal Artificial Intelligence (PAI), is a verified intelligent 3D avatar that looks like you, sounds like you, and can perform activities on your behalf. We have entered a new era of artificial intelligence, where we can create intelligent avatars made from the digital profiles of our behaviors online. We call them Personal Artificial Intelligence, or PAI. Project PAI is founded on the belief that every person in the world should have their own digital avatar, one that speaks, thinks, and behaves just like their self.
PAI BLOCKCHAIN PROTOCOL: A DECENTRALIZED ARTIFICIAL INTELLIGENCE NETWORK
v1
Principle and design goals
In this current ecosystem, individuals are unable to capture the value of their data, because they have lost control of its dissemination. Its value accrues instead to tech firms, to banks, to advertisers, and—it hardly needs saying—to malware authors and identity thieves. People’s personal data is a valuable commodity— but not one they can cash in on. This existing model is unsustainable because it concentrates the data economy in the hands of the few and leaves the general public out in the cold.
PAI Blockchain will serve as the public infrastructure necessary to upend this status quo, enabling people to own, provision, revoke access permission for, and conduct commerce with their personal data. They will be able to do this transparently and without having to rely on trusted central parties that may or may not be worthy of trust.
PAIs learn to think and behave like people because each one learns from the data of a specific person as well as from the data of that person’s community. PAIs excel when their ecosystem is driven by metrics that benefit the rights of individuals and the communities to which they belong. This starts with placing privacy, ownership of data, and permissioned access above centralized profit.
Technology implementation
Consensus mechanism
Consensus is derived in standard Bitcoin terms: mining on the longest chain and accepting transactions from that chain as valid. At any time, however, users can initiate acceptance of a new protocol by diverging from this methodology.
Accounts and transactions
Smart contract system
Cryptography
In recent decades, cryptographic systems based on elliptic-curve cryptography have proven to be significantly stronger—that is, more secure—than those based on first-generation public-key cryptography such as RSA. (For instance, it would take less energy to break a 228-bit RSA key than is needed to boil a teaspoon of water. The amount of energy needed to break an elliptic-curve key of the same length, by contrast, could boil all the water on earth.)7 Bitcoin has established itself as the longestrunning instance of elliptic-curve cryptography in a blockchain. PAI Blockchain builds on this success through the use of Bitcoin-standard authentication protocols.
PAI Blockchain uses secp256k18 EC field and curve parameters utilizing BIP329 hierarchical deterministic key derivation. The mobile client uses BIP3910 mnemonic codes to streamline the user experience for private key generation and storage. The client generates a keypair chain to accommodate each specific use case. Public keys are provisioned for transmitting and receiving coins, data, permissions, and other forms of communication between network nodes.
Key derivation on consumer hardware has proven to be insecure.11 Better methods will become available once tamper-resistant, auditable, and provably secure crypto-processors exist for ordinary users.
BIP11 M-of-N signatures can be used for escrow services as well as multi-party authorization of data and/or coin flows, thereby enforcing an approval process for granting a network participant access to data or funds.
Distributed storage protocol
Cross-chain and exchange technology
Special technology
Economic model and incentive
An information economy driven by proper incentives and compensation will create new frontiers for entrepreneurship. For many businesses, a primary objective will be the amalgamation of comprehensive datasets. Lucrative opportunities await those companies that can facilitate the secure storage of data and broker it responsibly. PAI augmentation itself will create entirely new markets.
Governance mechanism
Applications
Contributors
No contributors information for the version. to see perfessional version!
Comment
Rank | Blochchain | Similarity |
---|---|---|
1st
|
BTC
|
24.53168% |
2st
|
ZCL
|
23.399684% |
3st
|
NXS
|
22.5175766666667% |
4st
|
XWC
|
21.83352% |
5st
|
ENG
|
20.3355333333333% |
No analysis results for the version. to see perfessional version!
Rank | Blochchain | Similarity |
---|
Name:
Company:
Email:
Location:
Repos:
Followers: