Proof of work
From Wikipedia, the free encyclopedia
Jump to navigationJump to search
This article may require cleanup to meet Wikipedia's quality standards. The specific problem is: Needs verification and documentation Please help improve this article if you can. (May 2015) (Learn how and when to remove this template message)
Proof of work (PoW) is a form of cryptographic zero-knowledge proof in which one party (the prover) proves to others (the verifiers) that a certain amount of computational effort has been expended for some purpose. Verifiers can subsequently confirm this expenditure with minimal effort on their part. The concept was invented by Cynthia Dwork and Moni Naor in 1993 as a way to deter denial-of-service attacks and other service *****s such as spam on a network by requiring some work from a service requester, usually meaning processing time by a computer. The term "proof of work" was first coined and formalized in a 1999 paper by Markus Jakobsson and Ari Juels. Proof of work was later popularized by Bitcoin as a foundation for consensus in permissionless blockchains and cryptocurrencies, in which miners compete to append blocks and mint new currency, each miner experiencing a success probability proportional to the amount of computational effort they have provably expended. PoW and PoS (Proof of Stake) are the two best known consensus mechanisms and in the context of cryptocurrencies also most commonly used.
A key feature of proof-of-work schemes is their asymmetry: the work must be moderately hard (yet feasible) on the prover or requester side but easy to check for the verifier or service provider. This idea is also known as a *****U cost function, client puzzle, computational puzzle, or *****U pricing function. It is distinct in purpose from a CAPTCHA, which is intended for a human to solve quickly, while being difficult to solve for a computer.
Contents
1 Background
2 Variants
3 List of proof-of-work functions
4 Reusable proof-of-work as e-money
4.1 Bitcoin-type proof of work
4.2 Energy consumption
5 ASICs and mining pools
6 See also
7 Notes
8 References
9 External links
Background
One popular system, used in Hashcash, uses partial hash inversions to prove that work was done, as a goodwill token to send an e-mail. For instance, the following header represents about 252 hash computations to send a message to [email protected] on January 19, 2038:
X-Hashcash: 1:52:380119:[email protected]:::9B760005E92F0DAE
It is verified with a single computation by checking that the SHA-1 hash of the stamp (omit the header name X-Hashcash: including the colon and any amount of whitespace following it up to the digit '1') begins with 52 binary zeros, that is 13 hexadecimal zeros:
0000000000000756af69e2ffbdb930261873cd71
Whether PoW systems can actually solve a particular denial-of-service issue such as the spam problem is subject to debate; the system must make sending spam emails obtrusively unproductive for the spammer, but should also not prevent legitimate users from sending their messages. In other words, a genuine user should not encounter any difficulties when sending an email, but an email spammer would have to expend a considerable amount of computing power to send out many emails at once. Proof-of-work systems are being used as a primitive by other more complex cryptographic systems such as bitcoin which uses a system similar to Hashcash.
Variants
There are two classes of proof-of-work protocols.
Challenge–response protocols assume a direct interactive link between the requester (client) and the provider (server). The provider chooses a challenge, say an item in a set with a property, the requester finds the relevant response in the set, which is sent back and checked by the provider. As the challenge is chosen on the spot by the provider, its difficulty can be adapted to its current load. The work on the requester side may be bounded if the challenge-response protocol has a known solution (chosen by the provider), or is known to exist within a bounded search space.
Proof of Work challenge response.svg
Solution–verification protocols do not assume such a link: as a result, the problem must be self-imposed before a solution is sought by the requester, and the provider must check both the problem choice and the found solution. Most such schemes are unbounded probabilistic iterative procedures such as Hashcash.
Proof of Work solution verification.svg
Known-solution protocols tend to have slightly lower variance than unbounded probabilistic protocols because the variance of a rectangular distribution is lower than the variance of a Poisson distribution (with the same mean).[further explanation needed] A generic technique for reducing variance is to use multiple independent sub-challenges, as the average of multiple samples will have a lower variance.
There are also fixed-cost functions such as the time-lock puzzle.
Moreover, the underlying functions used by these schemes may be:
*****U-bound where the computation runs at the speed of the processor, which greatly varies in time, as well as from high-end server to low-end portable devices.
Memory-bound where the computation speed is bound by main memory accesses (either latency or bandwidth), the performance of which is expected to be less sensitive to hardware evolution.
Network-bound if the client must perform few computations, but must collect some tokens from remote servers before querying the final service provider. In this sense, the work is not actually performed by the requester, but it incurs delays anyway because of the latency to get the required tokens.
Finally, some PoW systems offer shortcut computations that allow participants who know a secret, typically a private key, to generate cheap PoWs. The rationale is that mailing-list holders may generate stamps for every recipient without incurring a high cost. Whether such a feature is desirable depends on the usage scenario.
List of proof-of-work functions
Here is a list of known proof-of-work functions:
Integer square root modulo a large prime[dubious – discuss]
Weaken Fiat–Shamir signatures
Ong–Schnorr–Shamir signature broken by Pollard
Partial hash inversion This paper formalizes the idea of a proof of work and introduces "the dependent idea of a bread pudding protocol", a "re-usable proof-of-work" (RPoW) system.
Hash sequences
Puzzles
Diffie–Hellman–based puzzle
Moderate
Mbound
Hokkaido
Cuckoo Cycle
Merkle tree–based
Guided tour puzzle protocol
Reusable proof-of-work as e-money
Computer scientist Hal Finney built on the proof-of-work idea, yielding a system that exploited reusable proof of work (RPoW). The idea of making proofs of work reusable for some practical purpose had already been established in 1999. Finney's purpose for RPoW was as token money. Just as a gold coin's value is thought to be underpinned by the value of the raw gold needed to make it, the value of an RPoW token is guaranteed by the value of the real-world resources required to 'mint' a PoW token. In Finney's version of RPoW, the PoW token is a piece of Hashcash.
A website can demand a PoW token in exchange for service. Requiring a PoW token from users would inhibit frivolous or excessive use of the service, sparing the service's underlying resources, such as bandwidth to the Internet, computation, disk space, electricity, and administrative overhead.
Finney's RPoW system differed from a PoW system in permitting the random exchange of tokens without repeating the work required to generate them. After someone had "spent" a PoW token at a website, the website's operator could exchange that "spent" PoW token for a new, unspent RPoW token, which could then be spent at some third-party website similarly equipped to accept RPoW tokens. This would save the resources otherwise needed to 'mint' a PoW token. The anti-counterfeit property of the RPoW token was guaranteed by remote attestation. The RPoW server that exchanges a used PoW or RPoW token for a new one of equal value uses remote attestation to allow any interested party to verify what software is running on the RPoW server. Since the source code for Finney's RPoW software was published (under a BSD-like license), any sufficiently knowledgeable programmer could, by inspecting the code, verify that the software (and, by extension, the RPoW server) never issued a new token except in exchange for a spent token of equal value.
Until 2009, Finney's system was the only RPoW system to have been implemented; it never saw economically significant use.
RPoW is protected by the private keys stored in the trusted platform module (TPM) hardware and manufacturers holding TPM private keys. Stealing a TPM manufacturer's key or obtaining the key by examining the TPM chip itself would subvert that assurance.
Bitcoin-type proof of work
In 2009, the Bitcoin network went online. Bitcoin is a proof-of-work cryptocurrency that, like Finney's RPoW, is also based on the Hashcash PoW. But in Bitcoin, double-spend protection is provided by a decentralized P2P protocol for tracking transfers of coins, rather than the hardware trusted computing function used by RPoW. Bitcoin has better trustworthiness because it is protected by computation. Bitcoins are "mined" using the Hashcash proof-of-work function by individual miners and verified by the decentralized nodes in the P2P bitcoin network.
The difficulty is periodically adjusted to keep the block time around a target time.
Energy consumption
Since the creation of Bitcoin, proof-of-work has been the predominant design of peer-to-peer cryptocurrency. Many studies have been looking at the energy consumption of mining. The PoW mechanism requires a vast amount of computing resources, which consume a significant amount of electricity. Bitcoin's energy consumption can power an entire country.
However, there is no alternative design known that could replace proof-of-work but keeps its desirable attributes such as:[citation needed]
permissionless mining
fair distribution of coins
security against many known attacks
bootstrappability of new nodes in a hostile environment
graceful degradation and recovery even in the face of a successful attack or network failure
unforgeable and statically verifiable costliness
Also, there have been many attempts at making proof-of-work use non-specialist hardware. However, this is neither possible, because any specific proof-of-work function can be optimised with hardware, nor desirable, because specialist mining equipment improves security by committing miners to the specific network they are mining for.[citation needed]
ASICs and mining pools
Within the Bitcoin community there are groups working together in mining pools. Some miners use application-specific integrated circuits (ASICs) for PoW. This trend toward mining pools and specialized ASICs has made mining some cryptocurrencies economically infeasible for most players without access to the latest ASICs, nearby sources of inexpensive energy, or other special advantages.
Some PoWs claim to be ASIC-resistant, i.e. to limit the efficiency gain that an ASIC can have over commodity hardware, like a GPU, to be well under an order of magnitude. ASIC resistance has the advantage of keeping mining economically feasible on commodity hardware, but also contributes to the corresponding risk that an attacker can briefly rent access to a large amount of unspecialized commodity processing power to launch a 51% attack against a cryptocurrency.
bitcoin деньги
ethereum асик mindgate bitcoin история ethereum
bitcoin koshelek bitcoin xpub bitcoin xt korbit bitcoin map bitcoin ethereum contracts wikileaks bitcoin анимация bitcoin клиент bitcoin bitcoin doubler bitcoin скрипт пул bitcoin bitcoin серфинг bitcoin принцип bitcoin etherium
tracker bitcoin bitcoin trade bitcoin оборудование korbit bitcoin bitcoin iq bitcoin игры bitcoin etherium segwit bitcoin bitcoin paypal акции bitcoin
bitcoin 1000 bitcoin обсуждение ethereum бесплатно
bitcoin x2 It was only recently that Equifax’s data was hacked.bitcoin foundation книга bitcoin трейдинг bitcoin запросы bitcoin Bitcoin was made to replace real money, while Ethereum was created to help people develop decentralized apps (dApps) with custom smart contracts.alpari bitcoin bitcoin шрифт Monero-Logo.svgbitcoin 4000 доходность ethereum monero gpu mine ethereum перспективы ethereum adc bitcoin bitcoin spin Because desktop and mobile wallets are running on a laptop or smartphone that’s connected to the internet, they’re less secure. As such, experts suggest keeping only a little money in them. For storing more than a little extra cash, that’s where hardware and paper wallets come in. accepts bitcoin
tether apk суть bitcoin bitcoin x2
video bitcoin
16 bitcoin ethereum 4pda bitcoin gif currency bitcoin ethereum markets bitcoin koshelek ecdsa bitcoin lurkmore bitcoin token bitcoin tether ico bitcoin торрент ethereum crane
bitcoin multibit ethereum кошельки ethereum ann bitcoin landing
ethereum node bitcoin seed bit bitcoin all cryptocurrency
курс bitcoin bitcoin accepted qiwi bitcoin ethereum algorithm bitcoin bot bitcoin автомат advcash bitcoin bitcoin обменники bitcoin icon up bitcoin bitcoin приложения tp tether bitcoin 1000 сколько bitcoin bitcoin motherboard coinwarz bitcoin
обменники bitcoin nvidia bitcoin bitcoin weekend ethereum rig bitcoin рухнул
x2 bitcoin кошелька bitcoin alliance bitcoin bitcoin даром
трейдинг bitcoin курсы bitcoin играть bitcoin bitcoin stock ethereum fork кран ethereum bitcoin программа
playstation bitcoin bitcoin poloniex сбербанк bitcoin bitcoin xt pizza bitcoin ava bitcoin
программа tether bitcoin mt4 stats ethereum playstation bitcoin bitcoin scrypt bitcoin ads topfan bitcoin bitcoin портал bitcoin token bitcoin bat cryptocurrency exchange bitcoin config bitcoin gift bitcoin описание bitcoin machine bitcoin blue bitcoin x2 куплю bitcoin iota cryptocurrency monero ico bitcoin pdf rotator bitcoin миллионер bitcoin monster bitcoin car bitcoin blocks bitcoin clicks bitcoin bitcoin сша бесплатные bitcoin регистрация bitcoin wallet cryptocurrency bitcoin foto debian bitcoin nicehash monero bitcoin get bitcoin quotes ethereum chart 1000 bitcoin bitcoin bounty
daemon bitcoin polkadot cadaver nicehash monero bitcoin blockstream ферма ethereum ru bitcoin keystore ethereum bitcoin map bitcoin play почему bitcoin 2016 bitcoin So, although people cannot easily see the personal identity or the details of the transaction, they can see the verified financial history of a bitcoin wallet. This is a good thing, as a public history adds transparency and security to every transaction.Banking or Other Fees to Use BitcoinsThat bitcoin is natively digital and powered by computers running software capable of being shut down lends to the default impression that bitcoin is inherently fragile. The mental image of a computer network being unplugged creates the false sense that one day and suddenly, somehow bitcoin as a system could cease to exist when the opposite is true for the very same reason. That bitcoin both exists everywhere and nowhere, that it is controlled by no one, that anyone is capable of running the open source software from anywhere, and that hundreds of thousands of people do, relied upon by tens of millions (and growing) is what gives bitcoin permanence. With no single point of failure, bitcoin is practically impossible to stop because it is impossible to control, and it is a dynamic system that only becomes more redundant and further decentralized in time and with increasing adoption. In short, bitcoin is more permanent than risky because it is an antifragile system. An idea popularized by Nassim Taleb, antifragility describes systems or phenomena that gain strength from disorder, which is bitcoin to its core. There is no silver-bullet that kills bitcoin; there is no competitor that can magically overtake it; there is no government that can shut it down. But it does not stop there; each attack vector and shock to the system actually causes bitcoin to become stronger.cryptocurrency dash
cryptocurrency tech bitcoin фарм блокчейн ethereum converter bitcoin bitcoin javascript bitcoin символ zcash bitcoin trade cryptocurrency sberbank bitcoin bitcoin knots bus bitcoin bitcoin hunter bitcoin рубли проекта ethereum bitcoin игры bitcoin vps bitcoin win bitcoin monkey bitcoin 100 bitcoin minergate майн ethereum bitcoin создать проекты bitcoin monero xmr hourly bitcoin bonus bitcoin adc bitcoin платформа bitcoin bitcoin p2p ethereum настройка wallet tether вики bitcoin зарегистрировать bitcoin
проект bitcoin bitcoin background code bitcoin кошель bitcoin fx bitcoin bitcointalk monero фото bitcoin bitcoin hyip bitcoin заработать dogecoin bitcoin верификация tether
monero difficulty ethereum калькулятор elysium bitcoin dance bitcoin korbit bitcoin bitcoin сигналы etherium bitcoin курс bitcoin bitcoin pdf bitcoin сатоши A stolen or hacked password of the online cloud bitcoin account (such as Coinbase)bitcoin cards
bitcoin life bitcoin investment
bitcoin doge bitcoin зарегистрироваться bitcoin robot bitcoin bounty bitcoin advcash reklama bitcoin blockchain monero bitcoin развитие ethereum pos monero blockchain bitcoin com фермы bitcoin android tether time bitcoin bitcoin vk crococoin bitcoin bitcoin терминалы 100 bitcoin bitcoin crane mail bitcoin
bitcoin телефон bit bitcoin новые bitcoin bitcoin trojan кошель bitcoin bitcoin roulette ethereum telegram транзакции ethereum bitcoin play bitcoin multisig rx560 monero remix ethereum monero bitcointalk bitcoin eu wallet tether reddit cryptocurrency monero usd etoro bitcoin bitcoin 1000 вклады bitcoin bitcoin сложность bitcoin mempool wikileaks bitcoin форумы bitcoin sell bitcoin x bitcoin bitcoin коды mail bitcoin bitcoin script
programming bitcoin системе bitcoin erc20 ethereum bitcoin парад bitcoin 20 bitcoin обналичить bitcoin мошенничество coinder bitcoin p2pool bitcoin ethereum contracts ethereum акции You don’t have millions of dollars in the bank to create your own blockchain cryptocurrency 'coin'bitcoin иконка ethereum mine
asrock bitcoin bitcoin бонусы monero обменять tether tools raiden ethereum bitcoin обменник пожертвование bitcoin проекта ethereum zcash bitcoin ставки bitcoin блоки bitcoin монет bitcoin bitcoin virus bitcoin bitcointalk bitcoin rpc 100 bitcoin ethereum blockchain swarm ethereum bitcoin master куплю ethereum bitcoin компьютер bitcoin daily выводить bitcoin особенности ethereum
email bitcoin bitcoin sberbank bitcoin китай
bitcoin msigna bitcoin аналоги capitalization cryptocurrency Several pertinent questions can lead us in the right direction: книга bitcoin rocket bitcoin
ethereum стоимость
программа tether multiplier bitcoin On 6 August 2014, the UK announced its Treasury had been commissioned a study of cryptocurrencies, and what role, if any, they can play in the UK economy. The study was also to report on whether regulation should be considered.● Regulation: Bitcoin is a new currency and payment rail that sits outside of existingbitcoin покупка
таблица bitcoin bitcoin lurkmore bitcoin мастернода bitcoin шахта bitcoin registration aliexpress bitcoin vizit bitcoin биткоин bitcoin instant bitcoin Last updated on Jan 11, 2021260570and there is a broader cost in the loss of ability to make non-reversible payments for nonreversible services. With the possibility of reversal, the need for trust spreads. Merchants mustbitcoin plugin
carding bitcoin monster bitcoin bitcoin kraken bitcoin ru пулы ethereum lazy bitcoin bitcoin фирмы bitcoin exchange apple bitcoin ico ethereum gift bitcoin bitcoin check bitcoin trojan nodes bitcoin blitz bitcoin linux ethereum bitcoin сервисы ethereum vk monero nvidia бизнес bitcoin all cryptocurrency cryptocurrency capitalization транзакции ethereum chain bitcoin ethereum addresses konverter bitcoin
ethereum forum
polkadot cadaver заработать ethereum bitcoin update bitcoin cli pokerstars bitcoin bitcoin waves bitcoin world cryptocurrency calendar дешевеет bitcoin бесплатные bitcoin
tether приложение картинки bitcoin green bitcoin bitcoin loan ethereum пул
сколько bitcoin chain bitcoin asics bitcoin bitcoin биржа polkadot stingray кости bitcoin swiss bitcoin bitcoin office ethereum chart fork bitcoin cryptocurrency arbitrage хайпы bitcoin se*****256k1 ethereum wechat bitcoin
bitcoin biz bitcoin usd
bitcoin de bitcoin портал blue bitcoin
bitcoin kran bitcoin synchronization
cryptocurrency analytics bitcoin wikileaks bitcoin btc
bitcoin бизнес tether coinmarketcap bitcoin calc bitcoin комиссия all bitcoin tether monero windows ethereum usd bitcoin express bitcoin journal bitcoin компания bitcoin шифрование io tether web3 ethereum регистрация bitcoin пулы bitcoin
bitcoin скачать bitcoin paper roboforex bitcoin
ethereum api новый bitcoin
ethereum телеграмм cryptocurrency calendar кредиты bitcoin tether транскрипция ethereum mining bitcoin laundering monero fee bitcoin вконтакте брокеры bitcoin
bitcoin loan bitcoin dynamics
bitcoin кредиты bitcoin мерчант tether обменник рубли bitcoin best bitcoin visa bitcoin rpc bitcoin
ethereum эфириум bitcoin me
bitcoin motherboard usdt tether reklama bitcoin
bitcoin прогноз monero форк bitcoin electrum перевод ethereum
solo bitcoin monero cryptonote bitcoin fortune course bitcoin ethereum serpent bitcoin compromised вывод bitcoin bitcoin conference mt5 bitcoin bitcoin service credit bitcoin monero address bitcoin exe top cryptocurrency love bitcoin ethereum эфир collector bitcoin
bitcoin комментарии magic bitcoin connect bitcoin бумажник bitcoin ethereum pow bitcoin бесплатные
будущее ethereum bitcoin fire bitcoin tails bitcoin paw statistics bitcoin rate bitcoin
bitcoin email 16 bitcoin bitcoin hunter bitcoin hack yota tether bitcoin bow bitcoin приложение bitcoin balance
bitcoin multiplier ethereum telegram bitcoin реклама bitcoin купить
bitcoin abc bitcoin go apple bitcoin monero 1060 kran bitcoin bitcoin dogecoin bitcoin generation ethereum телеграмм ethereum info bitcoin обналичить
знак bitcoin
знак bitcoin 2016 bitcoin bitcoin аккаунт
bitcoin мошенники wallet cryptocurrency tether js hashrate ethereum разработчик bitcoin tcc bitcoin
eth ethereum получение bitcoin bitcoin конверт roll bitcoin bitcoin комбайн динамика ethereum ethereum сегодня epay bitcoin cryptocurrency ethereum
bitcoin 100 ethereum alliance
добыча bitcoin habrahabr bitcoin monero продать ethereum вики ethereum транзакции ethereum btc trezor ethereum bitcoin etherium production cryptocurrency bitcoin 50 transaction bitcoin bitcoin cz
exchange ethereum
bitcoin официальный bitcoin ann bitcoin курс pixel bitcoin decred cryptocurrency
blog bitcoin mikrotik bitcoin
программа ethereum иконка bitcoin bitcoin paypal
ethereum форум bitcoin страна развод bitcoin fasterclick bitcoin monero график сайт bitcoin doge bitcoin цена ethereum bitrix bitcoin bitcoin аккаунт bitcoin virus bitcoin monkey froggy bitcoin 5 bitcoin bitcoin symbol pool bitcoin monero ann ethereum обвал bitcoin crash bitcoin mining bitcoin example
bitcoin clicks bitcoin шрифт ecdsa bitcoin
collector bitcoin bitcoin отзывы bitcoin кошелек bitcoin россия bonus bitcoin master bitcoin bitcoin conf ethereum shares проект bitcoin iphone tether testnet bitcoin кран bitcoin solidity ethereum bitcoin отследить bitcoin antminer инвестирование bitcoin автосборщик bitcoin bitcoin paypal bitcoin capitalization
bitcoin greenaddress ethereum пулы ethereum russia ava bitcoin bitcoin ether chvrches tether отзывы ethereum bitcoin debian игра ethereum bitcoin iso ethereum форки ethereum вывод dash cryptocurrency monero новости mt4 bitcoin фермы bitcoin cryptocurrency tech vpn bitcoin ico monero bitcoin win datadir bitcoin
bitcoin s платформа ethereum bitcoin capitalization bitcoin сбербанк bitcoin обвал connect bitcoin bitcoin update майнинг monero асик ethereum bitcoin super
txid ethereum обмена bitcoin кредит bitcoin раздача bitcoin bitcoin expanse tether bootstrap bitcoin mercado register bitcoin chain bitcoin bitcoin dollar сигналы bitcoin cryptocurrency tech hacking bitcoin оплатить bitcoin play bitcoin bitcoin pools
6000 bitcoin биржа ethereum bitcoin bitrix что bitcoin bitcoin android monero minergate перспективы bitcoin bitcoin статья bitcoin hunter
bitcoin акции
bitcoin linux lazy bitcoin free ethereum
кредит bitcoin Adoption as a World Reserve Currency - Eventually all transactions will be settled on the blockchain, including house titles, stock purchases, car titles, and other monetary instruments and currencies. Network effects one through six culminate in this final network effect. Any newcomer in the realm of cryptocurrency or traditional currency, for that matter; would need to beat Bitcoin in all seven of these areas. This is unlikely considering the pace of development in Bitcoin Core, the level of investment in Bitcoin companies around the world, the growth in Bitcoin's user base, and on and on; Further price increases will only accelerate the process. Finally, a speculative attack could dramatically boost the value of Bitcoin almost overnight.bitcoin plus майнер bitcoin scrypt bitcoin cryptocurrency logo надежность bitcoin bitcoin sberbank bitcoin mail алгоритм bitcoin bitcoin q bitcoin обменник bitcoin play сайты bitcoin