Function Transactions executed between the locks and unlocks of the main chain tokens don't bloat the main chain. As the technology of a side chain is connected to its main chain, it can be used to build on the developments of the main chain and introduce new features to the market. Child chains serve as the transactional chains of the parent-child architecture, as the parent chain retains minimal features.
The ethereum-based app builder has a dedicated team of experts looking at all varieties of fiat cash on distributed ledgers, and it's working with UnionBank of the Philippines to create a low-cost tokenized fiat solution for rural banking. In time, this could be extended to cover a larger network of banks and perhaps even the central bank, ConsenSys says.

And now for the second clever part. The logic above is symmetric. So, at any point, whoever is holding these coins on the sidechain can send them back to the Bitcoin network by creating a special transaction on the sidechain that immobilises the bitcoins on the sidechain. They’ll disappear from the sidechain and become available again on the Bitcoin network, under the control of whoever last owned them on the sidechain.
Jump up ^ Kopfstein, Janus (12 December 2013). "The Mission to Decentralize the Internet". The New Yorker. Archived from the original on 31 December 2014. Retrieved 30 December 2014. The network's 'nodes'—users running the bitcoin software on their computers—collectively check the integrity of other nodes to ensure that no one spends the same coins twice. All transactions are published on a shared public ledger, called the 'block chain.'

"Proof of Work" used by Bitcoin is a competitive consensus algorithm. Each node races to solve a difficult puzzle first. Doing so earns the right to produce a block and you are rewarded in Bitcoin. The block is where the transaction (value of data) is written and confirmed. However, this race is a waste of time and money for those that don’t win. You get nothing unless you are the first to solve the puzzle. Since no one wants to lose, nodes started working together to solve the puzzle and share the reward based on your computational power (the hash rate).

“Private blockchains are valuable to solve efficiency, security and fraud problems within traditional financial institutions, but only incrementally. Private blockchains will not revolutionize the financial system. Public blockchains, however, hold the potential to replace most functions of traditional financial institutions with software, fundamentally reshaping the way the financial system works.” 
An important distinction to be made about sidechains that needs to be understood is that sidechains themselves help to fuel innovation through experimentation. Rather than providing scalability directly, they allow for trivial experimentation on sidechains with various scalability mechanisms. Using sidechains, one can avoid the problems of initial distribution, market volatility, and barriers to entry when experimenting with altcoins due to the inherent derivation of their scarcity and supply from Bitcoin. That being said, each sidechain is independent and flexible to tool around with various features.
Federated Blockchains operate under the leadership of a group. As opposed to public Blockchains, they don’t allow any person with access to the Internet to participate in the process of verifying transactions. Federated Blockchains are faster (higher scalability) and provide more transaction privacy. Consortium blockchains are mostly used in the banking sector. The consensus process is controlled by a pre-selected set of nodes; for example, one might imagine a consortium of 15 financial institutions, each of which operates a node and of which 10 must sign every block in order for the block to be valid. The right to read the blockchain may be public, or restricted to the participants.

Another technology that could see more widespread use in the coming years is side chains. A side chain is defined for one specific use case. There can be multiple side chains where different tasks are distributed accordingly for improving the efficiency of processing. Maybe one application needs to optimize for high speeds and another needs to optimize for large computations. In any case, side chains can be used to handle commercial blockchain usage. CryptoKitties would have greatly benefitted from an optimized high-speed side chain. At one point, they jammed up the Ethereum blockchain with 25% of all transactions coming from their application.


You cannot be a crypto investor or entrepreneur without having a real understanding of the differences between these types of blockchains as well as their implications. Even if they are based on similar principles, their operation is, in fact, different to all levels. So the tokens issued by these blockchains will not be assessed in the same manner.
The first question to answer is “What is public blockchain?” The very name of this type of networks implies that they are open and permissionless. It means that anyone in the world can join the network, add blocks and view the information stored there. Indeed, public blockchains are totally transparent as any of their members can audit them. For this reason, independent participants can easily agree on transactions without middlemen and the fear of deception.
Consider a proof-of-existence application, where you want to authenticate your document in the Ethereum (for example) network, but you do not need your document to be online. So, you will store the hash generated from your document in the blockchain, but the document itself will be in your local machine, out of any blockchain-related structured, being off-chain.
– The transactions added to the blockchain are public: the whole world (Member of the network as non-members) can access transactions that are added to the blockchain. The information of the transactions is made public for the miners who do not know the other members, to check the conformity (for example that the person who has created a transaction holds enough bitcoins). These transactions are obviously not nominative, only your public key appears, but if someone knows your public key, he will be able to find all the transactions that you have created.
The sidechains vision of the future is of a vast globe-spanning decentralized network of many blockchains, an intertwined cable rather than a single strand, each with its own protocol, rules, and features — but all of them backed by Bitcoin, and protected by the Bitcoin mining network, as the US dollar was once backed by gold. Sidechains can also be used to prototype changes to the fundamental Bitcoin blockchain. One catch, though: this will require a small tweak to the existing Bitcoin protocol.
There has been tremendous interest in blockchain, the technology on which Bitcoin functions. Nakamoto developed the blockchain as an acceptable solution to the game theory puzzle – Byzantine General’s Problem. This lead to a number of firms adopting the technology in different ways to solve real world issues, wherever there was an element of trust involved. Majority of them could be relating to the ability to provide proof of ownership – for documents, software modules/licenses, voting etc.
Sidechains allow cryptocurrencies to interact with one another. They add flexibility and allow developers to experiment with Beta releases of Altcoins or software updates before pushing them on to the main chain. Traditional banking functions like issuing and tracking ownership of shares can be tested on sidechains before moving them onto main chains. If the security mechanisms for sidechains can be bolstered, sidechain technology holds promise for massive blockchain scalability.
Altcoin Altcoins Beginners Binance Binance Exchange Bitcoin Bitcoin cash Bitcoin Exchanges Bitcoin Wallet Address Bitcoin Wallets Bitfinex Blockchain BTC Buy bitcoins Changelly Coinomi Cryptocurrency Debit Card Decentralised exchange Desktop Wallet ERC20 ETH Ethereum Exchange Fork Hardware Wallet HD Wallets How to India Ledger Ledger Nano S Localbitcoins Mobile Wallet MyEtherWallet NEO Paper Wallet Privacy Private Key Review Security Trading Trezor Tutorial Wallet Web Wallet
×