Proof of work
From Wikipedia, the free encyclopedia
Jump to navigationJump to search
This article may require cleanup to meet Wikipedia's quality standards. The specific problem is: Needs verification and documentation Please help improve this article if you can. (May 2015) (Learn how and when to remove this template message)
Proof of work (PoW) is a form of cryptographic zero-knowledge proof in which one party (the prover) proves to others (the verifiers) that a certain amount of computational effort has been expended for some purpose. Verifiers can subsequently confirm this expenditure with minimal effort on their part. The concept was invented by Cynthia Dwork and Moni Naor in 1993 as a way to deter denial-of-service attacks and other service *****s such as spam on a network by requiring some work from a service requester, usually meaning processing time by a computer. The term "proof of work" was first coined and formalized in a 1999 paper by Markus Jakobsson and Ari Juels. Proof of work was later popularized by Bitcoin as a foundation for consensus in permissionless blockchains and cryptocurrencies, in which miners compete to append blocks and mint new currency, each miner experiencing a success probability proportional to the amount of computational effort they have provably expended. PoW and PoS (Proof of Stake) are the two best known consensus mechanisms and in the context of cryptocurrencies also most commonly used.
A key feature of proof-of-work schemes is their asymmetry: the work must be moderately hard (yet feasible) on the prover or requester side but easy to check for the verifier or service provider. This idea is also known as a *****U cost function, client puzzle, computational puzzle, or *****U pricing function. It is distinct in purpose from a CAPTCHA, which is intended for a human to solve quickly, while being difficult to solve for a computer.
Contents
1 Background
2 Variants
3 List of proof-of-work functions
4 Reusable proof-of-work as e-money
4.1 Bitcoin-type proof of work
4.2 Energy consumption
5 ASICs and mining pools
6 See also
7 Notes
8 References
9 External links
Background
One popular system, used in Hashcash, uses partial hash inversions to prove that work was done, as a goodwill token to send an e-mail. For instance, the following header represents about 252 hash computations to send a message to [email protected] on January 19, 2038:
X-Hashcash: 1:52:380119:[email protected]:::9B760005E92F0DAE
It is verified with a single computation by checking that the SHA-1 hash of the stamp (omit the header name X-Hashcash: including the colon and any amount of whitespace following it up to the digit '1') begins with 52 binary zeros, that is 13 hexadecimal zeros:
0000000000000756af69e2ffbdb930261873cd71
Whether PoW systems can actually solve a particular denial-of-service issue such as the spam problem is subject to debate; the system must make sending spam emails obtrusively unproductive for the spammer, but should also not prevent legitimate users from sending their messages. In other words, a genuine user should not encounter any difficulties when sending an email, but an email spammer would have to expend a considerable amount of computing power to send out many emails at once. Proof-of-work systems are being used as a primitive by other more complex cryptographic systems such as bitcoin which uses a system similar to Hashcash.
Variants
There are two classes of proof-of-work protocols.
Challenge–response protocols assume a direct interactive link between the requester (client) and the provider (server). The provider chooses a challenge, say an item in a set with a property, the requester finds the relevant response in the set, which is sent back and checked by the provider. As the challenge is chosen on the spot by the provider, its difficulty can be adapted to its current load. The work on the requester side may be bounded if the challenge-response protocol has a known solution (chosen by the provider), or is known to exist within a bounded search space.
Proof of Work challenge response.svg
Solution–verification protocols do not assume such a link: as a result, the problem must be self-imposed before a solution is sought by the requester, and the provider must check both the problem choice and the found solution. Most such schemes are unbounded probabilistic iterative procedures such as Hashcash.
Proof of Work solution verification.svg
Known-solution protocols tend to have slightly lower variance than unbounded probabilistic protocols because the variance of a rectangular distribution is lower than the variance of a Poisson distribution (with the same mean).[further explanation needed] A generic technique for reducing variance is to use multiple independent sub-challenges, as the average of multiple samples will have a lower variance.
There are also fixed-cost functions such as the time-lock puzzle.
Moreover, the underlying functions used by these schemes may be:
*****U-bound where the computation runs at the speed of the processor, which greatly varies in time, as well as from high-end server to low-end portable devices.
Memory-bound where the computation speed is bound by main memory accesses (either latency or bandwidth), the performance of which is expected to be less sensitive to hardware evolution.
Network-bound if the client must perform few computations, but must collect some tokens from remote servers before querying the final service provider. In this sense, the work is not actually performed by the requester, but it incurs delays anyway because of the latency to get the required tokens.
Finally, some PoW systems offer shortcut computations that allow participants who know a secret, typically a private key, to generate cheap PoWs. The rationale is that mailing-list holders may generate stamps for every recipient without incurring a high cost. Whether such a feature is desirable depends on the usage scenario.
List of proof-of-work functions
Here is a list of known proof-of-work functions:
Integer square root modulo a large prime[dubious – discuss]
Weaken Fiat–Shamir signatures
Ong–Schnorr–Shamir signature broken by Pollard
Partial hash inversion This paper formalizes the idea of a proof of work and introduces "the dependent idea of a bread pudding protocol", a "re-usable proof-of-work" (RPoW) system.
Hash sequences
Puzzles
Diffie–Hellman–based puzzle
Moderate
Mbound
Hokkaido
Cuckoo Cycle
Merkle tree–based
Guided tour puzzle protocol
Reusable proof-of-work as e-money
Computer scientist Hal Finney built on the proof-of-work idea, yielding a system that exploited reusable proof of work (RPoW). The idea of making proofs of work reusable for some practical purpose had already been established in 1999. Finney's purpose for RPoW was as token money. Just as a gold coin's value is thought to be underpinned by the value of the raw gold needed to make it, the value of an RPoW token is guaranteed by the value of the real-world resources required to 'mint' a PoW token. In Finney's version of RPoW, the PoW token is a piece of Hashcash.
A website can demand a PoW token in exchange for service. Requiring a PoW token from users would inhibit frivolous or excessive use of the service, sparing the service's underlying resources, such as bandwidth to the Internet, computation, disk space, electricity, and administrative overhead.
Finney's RPoW system differed from a PoW system in permitting the random exchange of tokens without repeating the work required to generate them. After someone had "spent" a PoW token at a website, the website's operator could exchange that "spent" PoW token for a new, unspent RPoW token, which could then be spent at some third-party website similarly equipped to accept RPoW tokens. This would save the resources otherwise needed to 'mint' a PoW token. The anti-counterfeit property of the RPoW token was guaranteed by remote attestation. The RPoW server that exchanges a used PoW or RPoW token for a new one of equal value uses remote attestation to allow any interested party to verify what software is running on the RPoW server. Since the source code for Finney's RPoW software was published (under a BSD-like license), any sufficiently knowledgeable programmer could, by inspecting the code, verify that the software (and, by extension, the RPoW server) never issued a new token except in exchange for a spent token of equal value.
Until 2009, Finney's system was the only RPoW system to have been implemented; it never saw economically significant use.
RPoW is protected by the private keys stored in the trusted platform module (TPM) hardware and manufacturers holding TPM private keys. Stealing a TPM manufacturer's key or obtaining the key by examining the TPM chip itself would subvert that assurance.
Bitcoin-type proof of work
In 2009, the Bitcoin network went online. Bitcoin is a proof-of-work cryptocurrency that, like Finney's RPoW, is also based on the Hashcash PoW. But in Bitcoin, double-spend protection is provided by a decentralized P2P protocol for tracking transfers of coins, rather than the hardware trusted computing function used by RPoW. Bitcoin has better trustworthiness because it is protected by computation. Bitcoins are "mined" using the Hashcash proof-of-work function by individual miners and verified by the decentralized nodes in the P2P bitcoin network.
The difficulty is periodically adjusted to keep the block time around a target time.
Energy consumption
Since the creation of Bitcoin, proof-of-work has been the predominant design of peer-to-peer cryptocurrency. Many studies have been looking at the energy consumption of mining. The PoW mechanism requires a vast amount of computing resources, which consume a significant amount of electricity. Bitcoin's energy consumption can power an entire country.
However, there is no alternative design known that could replace proof-of-work but keeps its desirable attributes such as:[citation needed]
permissionless mining
fair distribution of coins
security against many known attacks
bootstrappability of new nodes in a hostile environment
graceful degradation and recovery even in the face of a successful attack or network failure
unforgeable and statically verifiable costliness
Also, there have been many attempts at making proof-of-work use non-specialist hardware. However, this is neither possible, because any specific proof-of-work function can be optimised with hardware, nor desirable, because specialist mining equipment improves security by committing miners to the specific network they are mining for.[citation needed]
ASICs and mining pools
Within the Bitcoin community there are groups working together in mining pools. Some miners use application-specific integrated circuits (ASICs) for PoW. This trend toward mining pools and specialized ASICs has made mining some cryptocurrencies economically infeasible for most players without access to the latest ASICs, nearby sources of inexpensive energy, or other special advantages.
Some PoWs claim to be ASIC-resistant, i.e. to limit the efficiency gain that an ASIC can have over commodity hardware, like a GPU, to be well under an order of magnitude. ASIC resistance has the advantage of keeping mining economically feasible on commodity hardware, but also contributes to the corresponding risk that an attacker can briefly rent access to a large amount of unspecialized commodity processing power to launch a 51% attack against a cryptocurrency.
ethereum курс анонимность bitcoin cran bitcoin mac bitcoin bitcoin инструкция seed bitcoin box bitcoin bitcoin удвоить рынок bitcoin qiwi bitcoin Framing the problem as a phenomenon:Cheap. Fees can be very very low.bitcoin maps ssl bitcoin avatrade bitcoin bitcoin security bitcoin banks bitcoin converter bitcoin plugin лотерея bitcoin bitcoin scripting fasterclick bitcoin bitcoin center ninjatrader bitcoin earnings bitcoin bitcoin airbit se*****256k1 ethereum bitcoin clouding лотерея bitcoin криптовалюту monero суть bitcoin bitcoin bat 2x bitcoin ethereum io vpn bitcoin bitcoin mine monero simplewallet bitcoin playstation neo bitcoin платформы ethereum bitcoin форумы ethereum wallet twitter bitcoin bitcoin services car bitcoin bitcoin окупаемость пулы ethereum bitcoin facebook accelerator bitcoin escrow bitcoin total cryptocurrency лото bitcoin ethereum dark
miningpoolhub ethereum
bitcoin депозит bitcoin usb
баланс bitcoin обои bitcoin generation bitcoin arbitrage bitcoin rate bitcoin bitcoin 2010 bear bitcoin bitcoin calc
testnet bitcoin bitcoin atm
cryptocurrency wallets bitcoin etf check bitcoin bitcoin protocol технология bitcoin tether верификация bitcoin партнерка программа tether bitcoin создать bitcoin landing ethereum pow loans bitcoin adc bitcoin bitcoin trust алгоритм bitcoin bitcoin core фри bitcoin win bitcoin обвал ethereum bitcoin review
trading bitcoin dollar bitcoin ethereum rig bitcoin usd bitcoin список bitcoin iphone контракты ethereum капитализация bitcoin технология bitcoin bitcoin bitcoin автосерфинг пузырь bitcoin mikrotik bitcoin капитализация ethereum
The other important reason for the existence of cryptocurrency custody solutions is regulation. According to SEC regulation promulgated as part of the Dodd Frank Act, institutional investors that have customer assets worth more $150,000 are required to store the holdings with a 'qualified custodian.' The SEC’s definition of such entities includes banks and savings associations and registered broker-dealers. Futures commission merchants and foreign financial institutions are also included in this definition. Within the cryptocurrency ecosystem, very few mainstream banks offer custodian services. Kingdom Trust, a Kentucky-based custodian, was the largest such service for cryptocurrencies until it was purchased by BitGo, a San Francisco-based startup. ethereum адрес ethereum bitcoin bitcoin exchanges bitcoin cap история ethereum
live bitcoin ethereum faucet wikileaks bitcoin lazy bitcoin ethereum classic windows bitcoin eth ethereum monero hashrate neo cryptocurrency bitcoin banks clame bitcoin community bitcoin asus bitcoin
zona bitcoin bitcoin scam
автосборщик bitcoin tether 2 форумы bitcoin bitcoin xl mini bitcoin bitcoin программа bitcoin wiki chvrches tether валюта bitcoin иконка bitcoin
валюта tether bitcoin top инструкция bitcoin bounty bitcoin monero новости bitcoin mmgp tether верификация se*****256k1 ethereum tether валюта testnet bitcoin bitcoin краны by bitcoin bitcoin rpc stealer bitcoin
bitcoin legal green bitcoin
bitcoin investing bitcoin sign 999 bitcoin bitcoin exchanges wallet cryptocurrency фото bitcoin 22 bitcoin bitcoin reserve
ethereum аналитика bitcoin c
автокран bitcoin новые bitcoin ethereum chart bitcoin payza bitcoin media What are Mining Pools?ethereum контракты bitcoin iq
bitcoin раздача настройка bitcoin статистика bitcoin bitcoin rotator scrypt bitcoin
bitcoin safe bitcoin wikileaks bitcoin 9000 bitcoin 4 bitcoin 20
bitcoin keys bitcoin plus я bitcoin
usdt tether bitcoin shop location bitcoin it bitcoin bitcoin аккаунт калькулятор ethereum ethereum farm de bitcoin биржа monero
bitcoin отслеживание fee bitcoin bitcoin satoshi erc20 ethereum ethereum markets bitcoin capital ethereum addresses
monero pro cryptocurrency это ethereum addresses
ethereum asics capitalization bitcoin windows bitcoin blocks bitcoin обналичить bitcoin bitcoin drip boxbit bitcoin инструкция bitcoin bitcoin украина bitcoin автоматически фермы bitcoin логотип bitcoin bitcoin xpub tether coin bitcoin wikileaks foto bitcoin китай bitcoin ethereum ios ethereum casino пул monero новости monero stellar cryptocurrency bitcoin create bitcoin бонус capitalization bitcoin
cardano cryptocurrency bitcoin bubble обновление ethereum bitcoin spinner bitcoin trezor buy tether покупка bitcoin bitcoin fund ethereum contracts
ethereum bonus bitcoin android обмен bitcoin bitcoin switzerland bitcoin 10 So, how can personal data hacking be stopped using the blockchain?технология bitcoin invest bitcoin bitcoin магазины
currency bitcoin avatrade bitcoin bitcoin miner ethereum coin monero *****uminer cryptocurrency tech bitcoin окупаемость bitcoin cloud bitcoin казино se*****256k1 bitcoin json bitcoin bitcoin click
wifi tether locate bitcoin cryptocurrency bitcoin desk ethereum проблемы иконка bitcoin bitcoin is обменники ethereum avalon bitcoin bitcoin roll moon bitcoin bitcoin cap bitcoin блокчейн avto bitcoin bitfenix bitcoin bitcoin python bitcoin miner bitcoin кошелек hd7850 monero Satoshi Nakamoto envisioned Bitcoin as a platform for private economic activity, maintained by loose groups of volunteers. Platforms are most useful when they are stable. Stable platforms have few bugs and a clear use, making them an ideal platform for 'entrepreneurial joiners,' a distinct type of economic actor who do not want to assume the risk of founding a new project, but will contribute to an existing project if it accrues them similar benefits. A platform which is simple, stable, useful, and welcoming to new contributors will attract developers and joiners, as described in the aforementioned MIT study.bitcoin graph bitcoin landing cranes bitcoin обмена bitcoin bitcoin даром сборщик bitcoin
bitcoin 0 stratum ethereum ethereum script обмен tether bitcoin hash сеть ethereum bitcoin plus приват24 bitcoin
buy ethereum рулетка bitcoin chaindata ethereum ethereum dao geth ethereum monero новости testnet ethereum
картинки bitcoin
bitcoin torrent обвал ethereum bitcoin today billionaire bitcoin партнерка bitcoin claim bitcoin bitcoin лого торговать bitcoin ethereum контракт bitcoin 3d ethereum info locate bitcoin bitcoin суть bitcoin cryptocurrency график bitcoin arbitrage bitcoin gui monero bot bitcoin bitcoin покупка bitcoin wmx ethereum client
bitcoin минфин форумы bitcoin
ethereum github life bitcoin mini bitcoin проблемы bitcoin zone bitcoin blogspot bitcoin metatrader bitcoin bitcoin server компиляция bitcoin bitcoin бонусы вики bitcoin кошелька ethereum monero free rpg bitcoin locals bitcoin bitcoin tor сайт bitcoin machine bitcoin bitcoin hunter
pplns monero monero прогноз bitcoin проверить bitcoin book bitcoin reklama credit bitcoin video bitcoin bitcoin php usb bitcoin котировки ethereum ethereum курс 2048 bitcoin ethereum акции wallet cryptocurrency electrum bitcoin All target hashes begin with zeros—at least eight zeros and up to 63 zeros. bitcoin etherium пул bitcoin bitcoin статья 2016 bitcoin bitcoin окупаемость bitcoin japan bitcoin loan шрифт bitcoin bitcoin bitrix bitcoin central bitcoin войти ethereum info tether bitcointalk short bitcoin bitcoin map fake bitcoin usb tether tether приложения bitcoin clicks
bitcoin trinity bitcoin change bitcoin сша bitcoin банкнота bitcoin talk bitcoin биржа торрент bitcoin bitcoin зарегистрироваться algorithm bitcoin
clame bitcoin bitcoin валюты bitcoin knots bitcoin office bitcoin ocean bitcoin analysis balance bitcoin bitcoin cache логотип bitcoin loans bitcoin rpc bitcoin ethereum node обменник tether ethereum создатель rigname ethereum accepts bitcoin 10 bitcoin бесплатные bitcoin bitcoin крах monero ico polkadot store monero ico bitcoin удвоитель bitcoin чат майнинга bitcoin bitcoin подтверждение bitcoin office eth ethereum приложение tether trezor ethereum gek monero bitcoin развод bitcoin hosting боты bitcoin обмен monero To make a transaction, Alice signs over a payment instruction to Bob with her public-key-based signature . Ivan the issuer then packages the payment request into a receipt, and that receipt becomes the transaction.🗳️bitcoin money bitcoin torrent bitcoin матрица описание ethereum bitcoin хешрейт 3 bitcoin bitcoin darkcoin bitcoin capital заработка bitcoin ферма bitcoin
clicker bitcoin bitcoin blue koshelek bitcoin jaxx monero вывод monero криптокошельки ethereum joker bitcoin
bitcoin plus 33 bitcoin
ethereum stratum bitcoin genesis bitcoin weekly
проекта ethereum monero пул poker bitcoin bitcoin валюта bitcoin bio bitcoin минфин monero форум hacker bitcoin bitcoin youtube datadir bitcoin
bitcoin tm
вложения bitcoin eobot bitcoin компьютер bitcoin bitcoin nvidia
x2 bitcoin ethereum charts bitcoin hype nvidia bitcoin bitcoin акции
mail bitcoin monero miner reward bitcoin bitcoin перевод bitcoin etherium bitcoin ukraine сервера bitcoin A blockchain wallet is a cryptocurrency wallet that allows users to manage different kinds of cryptocurrencies—for example, Bitcoin or Ethereum. A blockchain wallet helps someone exchange funds easily. Transactions are secure, as they are cryptographically signed. The wallet is accessible from web devices, including mobile ones, and the privacy and identity of the user are maintained. So a blockchain wallet provides all the features that are necessary for safe and secure transfers and exchanges of funds between different parties.half bitcoin datadir bitcoin sportsbook bitcoin polkadot store cryptocurrency tech bitcoin utopia bitcoin калькулятор bitcoin иконка стоимость monero japan bitcoin япония bitcoin mercado bitcoin okpay bitcoin tether комиссии token bitcoin bitcoin tm bitcoin formula monero *****u
bitcoin лохотрон ферма ethereum bitcoin drip prune bitcoin bitcoin компьютер tether майнинг iso bitcoin ethereum вывод bitcoin is spin bitcoin bitcoin поиск bitcoin сатоши приват24 bitcoin нода ethereum bitcoin win
store bitcoin bitcoin оборудование раздача bitcoin
bitcoin xl продать monero moon ethereum bitcoin стратегия wallets cryptocurrency bitcoin видеокарты
bitcoin ira bitcoin change bitcoin бонусы bitcoin haqida
bitcoin проблемы исходники bitcoin ethereum калькулятор bitcoin microsoft bitcoinwisdom ethereum gas ethereum connect bitcoin bitcoin сатоши bitcoin update dance bitcoin майнер ethereum There are three destinations where the most venture capital flow is registered: US, Canada and China.bitcoin kran mini bitcoin ethereum asic
All this being said, a mining pool's size does reflect its trustworthiness to some extent. Despite all the positive and negative feedback posted online about a pool, a large number of active miners holding on to that pool suggests that they continue to trust that pool. bitcoin форекс bitcoin cloud cgminer ethereum love bitcoin bitcoin бизнес bitcoin создать bitcoin rub
mikrotik bitcoin tether валюта bitcoin блокчейн ethereum news apk tether bitcoin автоматически нода ethereum
bitcoin q fast bitcoin polkadot su ethereum serpent mt5 bitcoin cryptocurrency wallet ethereum акции tether coin
magic bitcoin bitcoin стоимость dark bitcoin bitcoin кошелька bitcoin frog bitcoin отследить Financial institutionsEach group in the system has their own incentives. Those incentives are not always 100% aligned with all other groups in the system. Groups will propose changes over time which are advantageous for them. Organisms are biased towards their own survival. This commonly manifests in changes to the reward structure, monetary policy, or balances of power.So, What is Cryptocurrency Mining For?According to Mark T. Williams, as of 30 September 2014, bitcoin has volatility seven times greater than gold, eight times greater than the S%trump2%P 500, and 18 times greater than the US dollar. Hodl is a meme created in reference to holding (as opposed to selling) during periods of volatility.credit bitcoin
cryptocurrency calendar Have you ever wondered which crypto exchanges are the best for your trading goals?ethereum токен bitcoin earning ethereum faucet ethereum упал бесплатно ethereum ccminer monero bitcoin ishlash bitcoin kz ethereum обменять bitcoin forums bounty bitcoin 1070 ethereum майнинг bitcoin bitcoin список bitcoin iphone bitcoin суть up bitcoin mining ethereum bitcoin ios #15 Stock tradingsimple bitcoin
Bitcoin mining is a lot like a giant lottery where you compete with your mining hardware with everyone on the network to earn bitcoins. Faster Bitcoin mining hardware is able to attempt more tries per second to win this lottery while the Bitcoin network itself adjusts roughly every two weeks to keep the rate of finding a winning block hash to every ten minutes. In the big picture, Bitcoin mining secures transactions that are recorded in Bitcon's public ledger, the block chain. By conducting a random lottery where electricity and specialized equipment are the price of admission, the cost to disrupt the Bitcoin network scales with the amount of hashing power that is being spent by all mining participants.matrix bitcoin
js bitcoin check bitcoin
ethereum ротаторы создатель ethereum bitcoin 2018 monero прогноз клиент ethereum кредиты bitcoin
bitcoin hyip bitcoin donate antminer ethereum rx470 monero ico monero best bitcoin bitcoin banks bitcoin take bitcoin rpc кран bitcoin вики bitcoin antminer ethereum check bitcoin monero hardware bitcoin mmm bitcoin перевод ethereum claymore
bitcoin развод RATINGInitially, your transaction will be executed, but if the execution of a smart contract costs more than the specified gas, then the miners will stop validating your contract. The Blockchain will record the transaction as failed, also the user doesn’t get a refund.bitcoin коллектор bitcointalk ethereum converter bitcoin locals bitcoin flypool ethereum foto bitcoin кошельки ethereum day bitcoin bitcoin cranes bitcoin автосерфинг dollar bitcoin ферма bitcoin bitcoin de cryptocurrency nem ферма bitcoin