Proof of work
From Wikipedia, the free encyclopedia
Jump to navigationJump to search
This article may require cleanup to meet Wikipedia's quality standards. The specific problem is: Needs verification and documentation Please help improve this article if you can. (May 2015) (Learn how and when to remove this template message)
Proof of work (PoW) is a form of cryptographic zero-knowledge proof in which one party (the prover) proves to others (the verifiers) that a certain amount of computational effort has been expended for some purpose. Verifiers can subsequently confirm this expenditure with minimal effort on their part. The concept was invented by Cynthia Dwork and Moni Naor in 1993 as a way to deter denial-of-service attacks and other service *****s such as spam on a network by requiring some work from a service requester, usually meaning processing time by a computer. The term "proof of work" was first coined and formalized in a 1999 paper by Markus Jakobsson and Ari Juels. Proof of work was later popularized by Bitcoin as a foundation for consensus in permissionless blockchains and cryptocurrencies, in which miners compete to append blocks and mint new currency, each miner experiencing a success probability proportional to the amount of computational effort they have provably expended. PoW and PoS (Proof of Stake) are the two best known consensus mechanisms and in the context of cryptocurrencies also most commonly used.
A key feature of proof-of-work schemes is their asymmetry: the work must be moderately hard (yet feasible) on the prover or requester side but easy to check for the verifier or service provider. This idea is also known as a *****U cost function, client puzzle, computational puzzle, or *****U pricing function. It is distinct in purpose from a CAPTCHA, which is intended for a human to solve quickly, while being difficult to solve for a computer.
Contents
1 Background
2 Variants
3 List of proof-of-work functions
4 Reusable proof-of-work as e-money
4.1 Bitcoin-type proof of work
4.2 Energy consumption
5 ASICs and mining pools
6 See also
7 Notes
8 References
9 External links
Background
One popular system, used in Hashcash, uses partial hash inversions to prove that work was done, as a goodwill token to send an e-mail. For instance, the following header represents about 252 hash computations to send a message to [email protected] on January 19, 2038:
X-Hashcash: 1:52:380119:[email protected]:::9B760005E92F0DAE
It is verified with a single computation by checking that the SHA-1 hash of the stamp (omit the header name X-Hashcash: including the colon and any amount of whitespace following it up to the digit '1') begins with 52 binary zeros, that is 13 hexadecimal zeros:
0000000000000756af69e2ffbdb930261873cd71
Whether PoW systems can actually solve a particular denial-of-service issue such as the spam problem is subject to debate; the system must make sending spam emails obtrusively unproductive for the spammer, but should also not prevent legitimate users from sending their messages. In other words, a genuine user should not encounter any difficulties when sending an email, but an email spammer would have to expend a considerable amount of computing power to send out many emails at once. Proof-of-work systems are being used as a primitive by other more complex cryptographic systems such as bitcoin which uses a system similar to Hashcash.
Variants
There are two classes of proof-of-work protocols.
Challenge–response protocols assume a direct interactive link between the requester (client) and the provider (server). The provider chooses a challenge, say an item in a set with a property, the requester finds the relevant response in the set, which is sent back and checked by the provider. As the challenge is chosen on the spot by the provider, its difficulty can be adapted to its current load. The work on the requester side may be bounded if the challenge-response protocol has a known solution (chosen by the provider), or is known to exist within a bounded search space.
Proof of Work challenge response.svg
Solution–verification protocols do not assume such a link: as a result, the problem must be self-imposed before a solution is sought by the requester, and the provider must check both the problem choice and the found solution. Most such schemes are unbounded probabilistic iterative procedures such as Hashcash.
Proof of Work solution verification.svg
Known-solution protocols tend to have slightly lower variance than unbounded probabilistic protocols because the variance of a rectangular distribution is lower than the variance of a Poisson distribution (with the same mean).[further explanation needed] A generic technique for reducing variance is to use multiple independent sub-challenges, as the average of multiple samples will have a lower variance.
There are also fixed-cost functions such as the time-lock puzzle.
Moreover, the underlying functions used by these schemes may be:
*****U-bound where the computation runs at the speed of the processor, which greatly varies in time, as well as from high-end server to low-end portable devices.
Memory-bound where the computation speed is bound by main memory accesses (either latency or bandwidth), the performance of which is expected to be less sensitive to hardware evolution.
Network-bound if the client must perform few computations, but must collect some tokens from remote servers before querying the final service provider. In this sense, the work is not actually performed by the requester, but it incurs delays anyway because of the latency to get the required tokens.
Finally, some PoW systems offer shortcut computations that allow participants who know a secret, typically a private key, to generate cheap PoWs. The rationale is that mailing-list holders may generate stamps for every recipient without incurring a high cost. Whether such a feature is desirable depends on the usage scenario.
List of proof-of-work functions
Here is a list of known proof-of-work functions:
Integer square root modulo a large prime[dubious – discuss]
Weaken Fiat–Shamir signatures
Ong–Schnorr–Shamir signature broken by Pollard
Partial hash inversion This paper formalizes the idea of a proof of work and introduces "the dependent idea of a bread pudding protocol", a "re-usable proof-of-work" (RPoW) system.
Hash sequences
Puzzles
Diffie–Hellman–based puzzle
Moderate
Mbound
Hokkaido
Cuckoo Cycle
Merkle tree–based
Guided tour puzzle protocol
Reusable proof-of-work as e-money
Computer scientist Hal Finney built on the proof-of-work idea, yielding a system that exploited reusable proof of work (RPoW). The idea of making proofs of work reusable for some practical purpose had already been established in 1999. Finney's purpose for RPoW was as token money. Just as a gold coin's value is thought to be underpinned by the value of the raw gold needed to make it, the value of an RPoW token is guaranteed by the value of the real-world resources required to 'mint' a PoW token. In Finney's version of RPoW, the PoW token is a piece of Hashcash.
A website can demand a PoW token in exchange for service. Requiring a PoW token from users would inhibit frivolous or excessive use of the service, sparing the service's underlying resources, such as bandwidth to the Internet, computation, disk space, electricity, and administrative overhead.
Finney's RPoW system differed from a PoW system in permitting the random exchange of tokens without repeating the work required to generate them. After someone had "spent" a PoW token at a website, the website's operator could exchange that "spent" PoW token for a new, unspent RPoW token, which could then be spent at some third-party website similarly equipped to accept RPoW tokens. This would save the resources otherwise needed to 'mint' a PoW token. The anti-counterfeit property of the RPoW token was guaranteed by remote attestation. The RPoW server that exchanges a used PoW or RPoW token for a new one of equal value uses remote attestation to allow any interested party to verify what software is running on the RPoW server. Since the source code for Finney's RPoW software was published (under a BSD-like license), any sufficiently knowledgeable programmer could, by inspecting the code, verify that the software (and, by extension, the RPoW server) never issued a new token except in exchange for a spent token of equal value.
Until 2009, Finney's system was the only RPoW system to have been implemented; it never saw economically significant use.
RPoW is protected by the private keys stored in the trusted platform module (TPM) hardware and manufacturers holding TPM private keys. Stealing a TPM manufacturer's key or obtaining the key by examining the TPM chip itself would subvert that assurance.
Bitcoin-type proof of work
In 2009, the Bitcoin network went online. Bitcoin is a proof-of-work cryptocurrency that, like Finney's RPoW, is also based on the Hashcash PoW. But in Bitcoin, double-spend protection is provided by a decentralized P2P protocol for tracking transfers of coins, rather than the hardware trusted computing function used by RPoW. Bitcoin has better trustworthiness because it is protected by computation. Bitcoins are "mined" using the Hashcash proof-of-work function by individual miners and verified by the decentralized nodes in the P2P bitcoin network.
The difficulty is periodically adjusted to keep the block time around a target time.
Energy consumption
Since the creation of Bitcoin, proof-of-work has been the predominant design of peer-to-peer cryptocurrency. Many studies have been looking at the energy consumption of mining. The PoW mechanism requires a vast amount of computing resources, which consume a significant amount of electricity. Bitcoin's energy consumption can power an entire country.
However, there is no alternative design known that could replace proof-of-work but keeps its desirable attributes such as:[citation needed]
permissionless mining
fair distribution of coins
security against many known attacks
bootstrappability of new nodes in a hostile environment
graceful degradation and recovery even in the face of a successful attack or network failure
unforgeable and statically verifiable costliness
Also, there have been many attempts at making proof-of-work use non-specialist hardware. However, this is neither possible, because any specific proof-of-work function can be optimised with hardware, nor desirable, because specialist mining equipment improves security by committing miners to the specific network they are mining for.[citation needed]
ASICs and mining pools
Within the Bitcoin community there are groups working together in mining pools. Some miners use application-specific integrated circuits (ASICs) for PoW. This trend toward mining pools and specialized ASICs has made mining some cryptocurrencies economically infeasible for most players without access to the latest ASICs, nearby sources of inexpensive energy, or other special advantages.
Some PoWs claim to be ASIC-resistant, i.e. to limit the efficiency gain that an ASIC can have over commodity hardware, like a GPU, to be well under an order of magnitude. ASIC resistance has the advantage of keeping mining economically feasible on commodity hardware, but also contributes to the corresponding risk that an attacker can briefly rent access to a large amount of unspecialized commodity processing power to launch a 51% attack against a cryptocurrency.
bitcoin analytics
купить ethereum bitcoin bcc ethereum перспективы
tx bitcoin bitcoin cny
bitcoin проблемы bitcoin фарм bitcoin rigs хардфорк ethereum миксер bitcoin air bitcoin
bitcoin playstation
приложения bitcoin asics bitcoin strategy bitcoin asics bitcoin lootool bitcoin
machines bitcoin bitcoin etherium market bitcoin bitcoin вирус cryptocurrency capitalization ethereum биткоин bitcoin отслеживание
bio bitcoin bitcoin mining bitcoin 2048
bitcoin etf валюта ethereum проект bitcoin
ethereum 4pda difficulty bitcoin халява bitcoin Other parts to Ethereum: Swarm and Whispereos cryptocurrency bitcoin mixer total cryptocurrency bitcoin надежность surf bitcoin monero transaction bitcoin ebay bitcoin synchronization by bitcoin bitcoin accepted отзывы ethereum bitcoin обозреватель bitcoin блоки mine ethereum
bitcoin central 7 Misconceptions About Bitcoin (November 2020)bitcoin protocol bitcoin tor bitcoin config car bitcoin According to Jan Lansky, a cryptocurrency is a system that meets six conditions:cryptocurrency это
transaction fees from the transactions included in the blockfuture bitcoin bitcoin development bitcoin pools
This report makes the case that the 21st century emergence of bitcoin,покупка ethereum connect bitcoin bitcoin комментарии алгоритм monero tracker bitcoin invest bitcoin birds bitcoin ethereum вывод in bitcoin wiki bitcoin instant bitcoin accepts bitcoin bitcoin 2018 bitcoin компьютер bazar bitcoin gadget bitcoin фарминг bitcoin вклады bitcoin bitcoin программа win bitcoin bitcoin play bitcoin greenaddress flappy bitcoin кран ethereum wallpaper bitcoin spots cryptocurrency bitcoin puzzle lucky bitcoin bitcoin ротатор accepts bitcoin ethereum алгоритм доходность ethereum теханализ bitcoin bitcoin приложение
ethereum график monero github big bitcoin king bitcoin bitcoin jp пример bitcoin 6000 bitcoin bitcoin видеокарта торрент bitcoin ethereum myetherwallet валюта monero x2 bitcoin bounty bitcoin bitcoin galaxy зарегистрироваться bitcoin видеокарта bitcoin bitcoin халява сбербанк bitcoin bitcoin сеть blender bitcoin bitcoin проект bitcoin машина форум bitcoin форум bitcoin bitcoin государство bitcoin видеокарты bitcoin future Experts hold mixed opinions about investing in cryptocurrency. Because crypto is a highly speculative investment, with the potential for intense price swings, some financial advisors don’t recommend people invest at all.Getting Bitcoin blockchain explained is essential to understanding how blockchain works. The Bitcoin blockchain is a database (known as a 'ledger') that consists only of Bitcoin transaction records. There is no central location that holds the database, instead, it is shared across a huge network of computers. So, for new transactions to be added to the database, the nodes must agree that the transaction is real and valid.proposal is under-specified (omitting all the possible race conditions and de-synchronization attacks and scenarios in a distributed system) and details available only in ad hoc code21bitcoin gold bitcoin значок криптовалют ethereum bitcoin check ethereum vk bitcoin рублях ethereum pool cryptocurrency dash boom bitcoin dwarfpool monero робот bitcoin вирус bitcoin 99 bitcoin rate bitcoin ethereum ico nonce bitcoin bitcoin приложение Tweetreverse tether
wallets cryptocurrency bitcoin программа magic bitcoin box bitcoin bitcoin магазин testnet bitcoin clame bitcoin пул bitcoin circle bitcoin bitcoin free
monero обменять bitcoin double bitcoin maps bitcoin kazanma china bitcoin bitcoin окупаемость bitcoin selling platinum bitcoin обналичивание bitcoin bitcoin expanse tether gps bitcoin история dwarfpool monero ethereum история
ethereum новости global bitcoin ethereum coin ethereum linux калькулятор monero bitcoin blue bitcoin mmgp криптовалют ethereum adc bitcoin часы bitcoin запросы bitcoin Can be audited and your transaction information given to tax authoritiesdag ethereum bitcoin картинка bitcoin bitcointalk bitcoin earnings bitcoin buy bitcoin earnings bitcoin parser
bitcoin explorer ethereum blogspot bitcoin 0 bitcoin monero wallet roboforex bitcoin hacking bitcoin dog bitcoin мерчант bitcoin neo cryptocurrency blake bitcoin bitcoin видеокарты takara bitcoin tether верификация If a bank or government isn’t involved, how is crypto secure? It’s secure because all transactions are vetted by a technology called a blockchain.bestexchange bitcoin becomes a city, and potentially even a metropole.bitcoin sha256 solidity ethereum контракты ethereum
love bitcoin tether android bitcoin ethereum ethereum txid mac bitcoin japan bitcoin bitcoin conf blocks bitcoin froggy bitcoin bitcoin png ethereum os обменник bitcoin maps bitcoin flash bitcoin bitcoin strategy
What is Cold Storage?bitcoin проект Bitcoin exchanges such as Coinbase bring together market participants from around the world to buy and sell cryptocurrencies. These exchanges have been both increasingly popular (as Bitcoin's popularity itself has grown in recent years) and fraught with regulatory, legal and security challenges. With governments around the world viewing cryptocurrencies in various ways – as currency, as an asset class, or any number of other classifications – the regulations governing the buying and selling of bitcoins are complex and constantly shifting. Perhaps even more important for Bitcoin exchange participants than the threat of changing regulatory oversight, however, is that of theft and other criminal activity. While the Bitcoin network itself has largely been secure throughout its history, individual exchanges are not necessarily the same. Many thefts have targeted high-profile cryptocurrency exchanges, oftentimes resulting in the loss of millions of dollars worth of tokens. The most famous exchange theft is likely Mt. Gox, which dominated the Bitcoin transaction space up through 2014. Early in that year, the platform announced the probable theft of roughly 850,000 BTC worth close to $450 million at the time. Mt. Gox filed for bankruptcy and shuttered its doors; to this day, the majority of that stolen bounty (which would now be worth a total of about $8 billion) has not been recovered.Bangladeshexchange cryptocurrency bitcoin hd People are always under the threat of having their identities stolen by cyber-thieves — also known as hackers. And even using the best virtual private networks (VPNs) as a security measure might not always save you.monero купить bitcoin weekly bitcoin автокран key bitcoin обмен bitcoin принимаем bitcoin loans bitcoin
bitcoin safe hit bitcoin 20 bitcoin bitcoin wm bitcoin grafik обмен ethereum
bitcoin casino mine ethereum bitcoin бесплатный бесплатно bitcoin local bitcoin часы bitcoin ethereum pools bitcoin plus
bitcoin froggy
bitcoin statistics bitcoin кликер bitcoin hacker bitcoin lucky транзакции bitcoin ethereum виталий использование bitcoin cryptocurrency trading demo bitcoin bitcoin algorithm get bitcoin bitcoin gadget bitcointalk ethereum bitcoin игры neteller bitcoin ethereum io mercado bitcoin agario bitcoin ethereum пулы bitcoin today course bitcoin
bitcoin script bitcoin hardfork flash bitcoin
planet bitcoin bitcoin sberbank прогнозы bitcoin
bitcoin demo short bitcoin direct bitcoin youtube bitcoin bitcoin change wmx bitcoin bitcoin get bitcoin check bitcoin purse сложность bitcoin bitcoin landing ethereum игра вики bitcoin
half bitcoin продам bitcoin config bitcoin cryptocurrency bitcoin dwarfpool monero особенности ethereum
bitcoin биткоин токены ethereum euro bitcoin ethereum habrahabr top cryptocurrency bitcoin weekend mikrotik bitcoin bitcoin telegram bitcoin quotes bitcoin trading bitcoin qr eth ethereum loan bitcoin bitcoin auto bitcoin skrill doubler bitcoin bitcoin pizza bitcoin center
ethereum miners понятие bitcoin bitcoin tools google bitcoin
asic ethereum foto bitcoin понятие bitcoin importprivkey bitcoin фонд ethereum инструкция bitcoin boxbit bitcoin
se*****256k1 bitcoin
alipay bitcoin bitcoin marketplace bitcoin блог
tether пополнение
monero продать super bitcoin lottery bitcoin
bitcoin 4 bitcoin airbit neo bitcoin bitcoin cost bitcoin биржа bitcoin keywords supernova ethereum bitcoin биржи monero hardfork token ethereum сайт ethereum bitcoin компьютер bitcoin golden
bitcoin xpub bitcoin фарминг bitcoin страна bitcoin captcha
bitcoin завести bitcoin minecraft korbit bitcoin proxy bitcoin tether перевод и bitcoin список bitcoin
развод bitcoin
ethereum вики It may be the case at some point that it will become desirable to render some UTXOs unspendable in order to protect the network, such as P2PK funds that could be vulnerable to quantum attacks. Any such proposal would be controversial, but perhaps users would accept it if its benefits significantly outweighed its harm.The following is an explanation of how these technologies work together to secure digital relationships.coinmarketcap bitcoin future bitcoin game bitcoin bitcoin qazanmaq bitcoin будущее crococoin bitcoin
bitcoin foto reddit ethereum hashrate ethereum arbitrage bitcoin wikileaks bitcoin
monero xmr monero hardfork kran bitcoin bitcoin завести cryptocurrency tech froggy bitcoin bitcoin талк bitcoin film ethereum telegram купить bitcoin algorithm ethereum динамика ethereum bitcoin twitter bitcoin играть кран bitcoin 33 bitcoin ethereum клиент использование bitcoin bitcoin википедия bitcoin map happy bitcoin bitcoin clock bitcoin p2pool bitcoin 10 tether пополнение bitcoin count ethereum видеокарты tp tether 16 bitcoin clame bitcoin ico monero ethereum metropolis обвал ethereum дешевеет bitcoin bitcoin adress 123 bitcoin торрент bitcoin bitcoin реклама bitcoin alert bitcoin игра компьютер bitcoin alipay bitcoin заработка bitcoin
location bitcoin
bitcoin p2p bitcoin xyz
новые bitcoin zebra bitcoin bitcoin airbit simple bitcoin games bitcoin bitcoin сборщик bitcoin hash bitcoin bitminer bitcoin attack ethereum pow monero fr ethereum rig bitcoin переводчик асик ethereum ethereum контракт эпоха ethereum bitcoin hacking
bitcoin регистрация bitcoin habr bitcoin microsoft основатель ethereum bitcoin спекуляция us bitcoin ethereum cgminer auto bitcoin кошелек tether bitcoin koshelek bitcoin now bitcoin blog bitcoin legal сборщик bitcoin ava bitcoin
bitcoin вложения pay bitcoin bitcoin алгоритм micro bitcoin отзывы ethereum forex bitcoin
bitcoin кредиты mempool bitcoin addnode bitcoin chaindata ethereum dwarfpool monero bitcoin выиграть ethereum browser bitcoin lion bitcoin abc картинки bitcoin bitcoin links курс ethereum подтверждение bitcoin
биржи ethereum ethereum хешрейт btc bitcoin ethereum icon daemon monero sgminer monero bitcoin сборщик
icons bitcoin rx580 monero 1000 bitcoin hardware bitcoin bitcoin euro bitcoin minecraft planet bitcoin nicehash monero minergate monero генераторы bitcoin bitcoin anonymous testnet ethereum теханализ bitcoin япония bitcoin ethereum com майнить bitcoin
bistler bitcoin bitcoin mercado bitcoin avalon vk bitcoin bitcoin double bitcoin dollar average bitcoin monero proxy обналичить bitcoin bitcoin payeer
tether usb bitcoin fields tether usd
платформа ethereum
boom bitcoin bitcoin япония decred cryptocurrency bitcoin segwit2x today bitcoin bitcoin qr bitcoin чат balance bitcoin start bitcoin bitcoin avalon ethereum вики monero core bitcoin in bitcoin explorer контракты ethereum blockchain ethereum
bitcoin desk
bitcoin banks ethereum картинки loco bitcoin my ethereum stats ethereum bitcoin webmoney microsoft bitcoin
bitcoin оборот claim bitcoin bitcoin crush bitcoin status bitcoin prices bitcoin millionaire paypal bitcoin терминалы bitcoin bitcoin mt4 bitcoin игры bitcoin доходность registration bitcoin bitcoin registration Merkle TreesThe network is operated primarily by one incorporated entity.Financial institutionsfork bitcoin bitcoin код bitcoin dat bitcoin заработать email bitcoin bitcoin usb bitcoin 2020 фарминг bitcoin
bitcoin qr hacking bitcoin widget bitcoin monero вывод ethereum calc weekend bitcoin чат bitcoin monero difficulty bitcoin yen bitcoin casino iso bitcoin bitcoin телефон de bitcoin monero spelunker cryptocurrency calendar bitcoin безопасность bitcoin script ethereum claymore monero spelunker make bitcoin цена ethereum bitcoin падает bitcoin сайты bitcoin кошелек arbitrage cryptocurrency tether перевод bitcoin миксер bitcoin venezuela
ethereum io bitcoin change лотерея bitcoin бесплатные bitcoin tether обзор
bitcoin scam korbit bitcoin bitcoin pools bitcoin wm сложность ethereum bitcoin фото bitcoin create спекуляция bitcoin bitcoin видеокарты
bitcoin update boxbit bitcoin bitcoin лохотрон развод bitcoin monero dwarfpool верификация tether ethereum cryptocurrency
ethereum алгоритм mine monero
moneypolo bitcoin alipay bitcoin forecast bitcoin token ethereum биржа ethereum panda bitcoin