Proof of work
From Wikipedia, the free encyclopedia
Jump to navigationJump to search
This article may require cleanup to meet Wikipedia's quality standards. The specific problem is: Needs verification and documentation Please help improve this article if you can. (May 2015) (Learn how and when to remove this template message)
Proof of work (PoW) is a form of cryptographic zero-knowledge proof in which one party (the prover) proves to others (the verifiers) that a certain amount of computational effort has been expended for some purpose. Verifiers can subsequently confirm this expenditure with minimal effort on their part. The concept was invented by Cynthia Dwork and Moni Naor in 1993 as a way to deter denial-of-service attacks and other service *****s such as spam on a network by requiring some work from a service requester, usually meaning processing time by a computer. The term "proof of work" was first coined and formalized in a 1999 paper by Markus Jakobsson and Ari Juels. Proof of work was later popularized by Bitcoin as a foundation for consensus in permissionless blockchains and cryptocurrencies, in which miners compete to append blocks and mint new currency, each miner experiencing a success probability proportional to the amount of computational effort they have provably expended. PoW and PoS (Proof of Stake) are the two best known consensus mechanisms and in the context of cryptocurrencies also most commonly used.
A key feature of proof-of-work schemes is their asymmetry: the work must be moderately hard (yet feasible) on the prover or requester side but easy to check for the verifier or service provider. This idea is also known as a *****U cost function, client puzzle, computational puzzle, or *****U pricing function. It is distinct in purpose from a CAPTCHA, which is intended for a human to solve quickly, while being difficult to solve for a computer.
Contents
1 Background
2 Variants
3 List of proof-of-work functions
4 Reusable proof-of-work as e-money
4.1 Bitcoin-type proof of work
4.2 Energy consumption
5 ASICs and mining pools
6 See also
7 Notes
8 References
9 External links
Background
One popular system, used in Hashcash, uses partial hash inversions to prove that work was done, as a goodwill token to send an e-mail. For instance, the following header represents about 252 hash computations to send a message to [email protected] on January 19, 2038:
X-Hashcash: 1:52:380119:[email protected]:::9B760005E92F0DAE
It is verified with a single computation by checking that the SHA-1 hash of the stamp (omit the header name X-Hashcash: including the colon and any amount of whitespace following it up to the digit '1') begins with 52 binary zeros, that is 13 hexadecimal zeros:
0000000000000756af69e2ffbdb930261873cd71
Whether PoW systems can actually solve a particular denial-of-service issue such as the spam problem is subject to debate; the system must make sending spam emails obtrusively unproductive for the spammer, but should also not prevent legitimate users from sending their messages. In other words, a genuine user should not encounter any difficulties when sending an email, but an email spammer would have to expend a considerable amount of computing power to send out many emails at once. Proof-of-work systems are being used as a primitive by other more complex cryptographic systems such as bitcoin which uses a system similar to Hashcash.
Variants
There are two classes of proof-of-work protocols.
Challenge–response protocols assume a direct interactive link between the requester (client) and the provider (server). The provider chooses a challenge, say an item in a set with a property, the requester finds the relevant response in the set, which is sent back and checked by the provider. As the challenge is chosen on the spot by the provider, its difficulty can be adapted to its current load. The work on the requester side may be bounded if the challenge-response protocol has a known solution (chosen by the provider), or is known to exist within a bounded search space.
Proof of Work challenge response.svg
Solution–verification protocols do not assume such a link: as a result, the problem must be self-imposed before a solution is sought by the requester, and the provider must check both the problem choice and the found solution. Most such schemes are unbounded probabilistic iterative procedures such as Hashcash.
Proof of Work solution verification.svg
Known-solution protocols tend to have slightly lower variance than unbounded probabilistic protocols because the variance of a rectangular distribution is lower than the variance of a Poisson distribution (with the same mean).[further explanation needed] A generic technique for reducing variance is to use multiple independent sub-challenges, as the average of multiple samples will have a lower variance.
There are also fixed-cost functions such as the time-lock puzzle.
Moreover, the underlying functions used by these schemes may be:
*****U-bound where the computation runs at the speed of the processor, which greatly varies in time, as well as from high-end server to low-end portable devices.
Memory-bound where the computation speed is bound by main memory accesses (either latency or bandwidth), the performance of which is expected to be less sensitive to hardware evolution.
Network-bound if the client must perform few computations, but must collect some tokens from remote servers before querying the final service provider. In this sense, the work is not actually performed by the requester, but it incurs delays anyway because of the latency to get the required tokens.
Finally, some PoW systems offer shortcut computations that allow participants who know a secret, typically a private key, to generate cheap PoWs. The rationale is that mailing-list holders may generate stamps for every recipient without incurring a high cost. Whether such a feature is desirable depends on the usage scenario.
List of proof-of-work functions
Here is a list of known proof-of-work functions:
Integer square root modulo a large prime[dubious – discuss]
Weaken Fiat–Shamir signatures
Ong–Schnorr–Shamir signature broken by Pollard
Partial hash inversion This paper formalizes the idea of a proof of work and introduces "the dependent idea of a bread pudding protocol", a "re-usable proof-of-work" (RPoW) system.
Hash sequences
Puzzles
Diffie–Hellman–based puzzle
Moderate
Mbound
Hokkaido
Cuckoo Cycle
Merkle tree–based
Guided tour puzzle protocol
Reusable proof-of-work as e-money
Computer scientist Hal Finney built on the proof-of-work idea, yielding a system that exploited reusable proof of work (RPoW). The idea of making proofs of work reusable for some practical purpose had already been established in 1999. Finney's purpose for RPoW was as token money. Just as a gold coin's value is thought to be underpinned by the value of the raw gold needed to make it, the value of an RPoW token is guaranteed by the value of the real-world resources required to 'mint' a PoW token. In Finney's version of RPoW, the PoW token is a piece of Hashcash.
A website can demand a PoW token in exchange for service. Requiring a PoW token from users would inhibit frivolous or excessive use of the service, sparing the service's underlying resources, such as bandwidth to the Internet, computation, disk space, electricity, and administrative overhead.
Finney's RPoW system differed from a PoW system in permitting the random exchange of tokens without repeating the work required to generate them. After someone had "spent" a PoW token at a website, the website's operator could exchange that "spent" PoW token for a new, unspent RPoW token, which could then be spent at some third-party website similarly equipped to accept RPoW tokens. This would save the resources otherwise needed to 'mint' a PoW token. The anti-counterfeit property of the RPoW token was guaranteed by remote attestation. The RPoW server that exchanges a used PoW or RPoW token for a new one of equal value uses remote attestation to allow any interested party to verify what software is running on the RPoW server. Since the source code for Finney's RPoW software was published (under a BSD-like license), any sufficiently knowledgeable programmer could, by inspecting the code, verify that the software (and, by extension, the RPoW server) never issued a new token except in exchange for a spent token of equal value.
Until 2009, Finney's system was the only RPoW system to have been implemented; it never saw economically significant use.
RPoW is protected by the private keys stored in the trusted platform module (TPM) hardware and manufacturers holding TPM private keys. Stealing a TPM manufacturer's key or obtaining the key by examining the TPM chip itself would subvert that assurance.
Bitcoin-type proof of work
In 2009, the Bitcoin network went online. Bitcoin is a proof-of-work cryptocurrency that, like Finney's RPoW, is also based on the Hashcash PoW. But in Bitcoin, double-spend protection is provided by a decentralized P2P protocol for tracking transfers of coins, rather than the hardware trusted computing function used by RPoW. Bitcoin has better trustworthiness because it is protected by computation. Bitcoins are "mined" using the Hashcash proof-of-work function by individual miners and verified by the decentralized nodes in the P2P bitcoin network.
The difficulty is periodically adjusted to keep the block time around a target time.
Energy consumption
Since the creation of Bitcoin, proof-of-work has been the predominant design of peer-to-peer cryptocurrency. Many studies have been looking at the energy consumption of mining. The PoW mechanism requires a vast amount of computing resources, which consume a significant amount of electricity. Bitcoin's energy consumption can power an entire country.
However, there is no alternative design known that could replace proof-of-work but keeps its desirable attributes such as:[citation needed]
permissionless mining
fair distribution of coins
security against many known attacks
bootstrappability of new nodes in a hostile environment
graceful degradation and recovery even in the face of a successful attack or network failure
unforgeable and statically verifiable costliness
Also, there have been many attempts at making proof-of-work use non-specialist hardware. However, this is neither possible, because any specific proof-of-work function can be optimised with hardware, nor desirable, because specialist mining equipment improves security by committing miners to the specific network they are mining for.[citation needed]
ASICs and mining pools
Within the Bitcoin community there are groups working together in mining pools. Some miners use application-specific integrated circuits (ASICs) for PoW. This trend toward mining pools and specialized ASICs has made mining some cryptocurrencies economically infeasible for most players without access to the latest ASICs, nearby sources of inexpensive energy, or other special advantages.
Some PoWs claim to be ASIC-resistant, i.e. to limit the efficiency gain that an ASIC can have over commodity hardware, like a GPU, to be well under an order of magnitude. ASIC resistance has the advantage of keeping mining economically feasible on commodity hardware, but also contributes to the corresponding risk that an attacker can briefly rent access to a large amount of unspecialized commodity processing power to launch a 51% attack against a cryptocurrency.
mt5 bitcoin bitcoin видеокарта bitcoin trust kinolix bitcoin monero client tether usb bitcoin развод сайте bitcoin инвестирование bitcoin bitcoin монета
bitcoin crash
coinder bitcoin abi ethereum график ethereum
electrum bitcoin bitcoinwisdom ethereum nicehash monero bitcoin genesis чат bitcoin
платформа ethereum bitcoin symbol se*****256k1 ethereum ava bitcoin bitcoin client pull bitcoin пицца bitcoin bitcoin yen bitcoin скрипт bistler bitcoin bitcoin paypal bitcoin multiplier stock bitcoin bitcoin коллектор bitcoin rt ico monero bitcoin 4000 iobit bitcoin скрипт bitcoin пузырь bitcoin bitcoin download покупка ethereum generator bitcoin blogspot bitcoin bitcoin reserve cz bitcoin
txid ethereum ethereum сегодня bitcoin приложение ico monero ethereum настройка ethereum сложность криптовалюты bitcoin майнинга bitcoin ethereum ann киа bitcoin 1080 ethereum bitcoin криптовалюта
ethereum bonus значок bitcoin игра ethereum
ann ethereum nicehash monero ethereum курсы
bitcoin scam monero кран казахстан bitcoin bitcoin dat алгоритмы bitcoin client ethereum cryptocurrency trade 999 bitcoin sec bitcoin cryptocurrency tech бот bitcoin bitcoin talk goldsday bitcoin time bitcoin ethereum info
карты bitcoin знак bitcoin лото bitcoin multiply bitcoin nicehash bitcoin
bitcoin investment эпоха ethereum bitcoin bitminer polkadot cadaver bitcoin metal
cz bitcoin bitcoin aliexpress купить ethereum tera bitcoin avto bitcoin пул bitcoin
stellar cryptocurrency bitcoin сложность bitcoin лохотрон bitcoin рейтинг bitcoin ключи bitcoin обучение ava bitcoin ethereum news bitcoin пожертвование games bitcoin bitcoin info ethereum конвертер bitcoin wm love bitcoin half bitcoin блоки bitcoin bitcoin конвертер bitcoin delphi
bitcoin cnbc bitcoin department phoenix bitcoin 2 bitcoin bitcoin фарм the ethereum lealana bitcoin инструкция bitcoin bitcoin qr оплата bitcoin bitcoin бумажник bitcoin stock bitcoin background uk bitcoin ethereum supernova bitcoin dollar bitcoin python tether coin bitcoin ферма bitcoin change проекты bitcoin куплю ethereum bitcoin jp
bitcoin formula скачать bitcoin
зарегистрировать bitcoin валюты bitcoin 1 monero розыгрыш bitcoin
bitcoin mastercard bitcoin получить bitcoin motherboard buy tether metatrader bitcoin bitcoin script bitcoin bloomberg платформы ethereum aml bitcoin
tether wallet bitcoin monero ethereum serpent
bitcoin миксер bitcoin конец wechat bitcoin 777 bitcoin bitcoin rpc
bitcoin hash
bitcoin проверить fx bitcoin bitcoin redex bitcoin doge lealana bitcoin bitcoin котировка dollar bitcoin ethereum сегодня зебра bitcoin bitcoin анализ конвертер bitcoin перспектива bitcoin bitcoin store etf bitcoin equihash bitcoin genesis bitcoin блок bitcoin collector bitcoin книга bitcoin криптовалют ethereum bitcoin send
lootool bitcoin bitcoin group bitcoin 1000 bitcoin регистрации ethereum упал moneybox bitcoin asics bitcoin надежность bitcoin mine bitcoin bitcoin roll теханализ bitcoin monero address кошелек monero locate bitcoin lootool bitcoin bitcoin wallpaper bitcoin in bitcoin рбк
bitcoin forbes часы bitcoin bitcoin satoshi cryptocurrency tech enterprise ethereum bitcoin habr bitcoin котировка ethereum статистика fee bitcoin bitcoin grafik bitcoin account bitcoin коллектор ферма bitcoin Intentional forks that modify the rules of a blockchain can be classified as follows:ethereum miner cran bitcoin ethereum io рейтинг bitcoin up bitcoin
ethereum course NiceHash Review: NiceHash offers you to sell and buy hashing power. Selling hashing power is as simple as connecting your miner to our stratum mining pools while buyers can buy hashing power on demand, on pay-as-you-go basis. Claims to bring an innovative easy-to-use and risk-free cloud mining service. You can mine the vast majority of popular coins, based on SHA-256 (Bitcoin, etc.), Scrypt (Litecoin, Dogecoin, etc.), Scrypt-N (Vertcoin, etc.) and X11 (DarkCoin, etc.).bitcoin hyip Basic Bitcoin Common Sensehack bitcoin
основатель bitcoin game bitcoin bitcoin часы it bitcoin кости bitcoin bitcoin venezuela ethereum com game bitcoin clicker bitcoin xpub bitcoin exchanges bitcoin bitcoin форк cryptocurrency charts bitcoin mercado
boom bitcoin short bitcoin знак bitcoin обмен tether
bitcoin habrahabr ethereum обменять cryptocurrency dash bitcoin expanse space bitcoin bitcoin pool electrum ethereum plus bitcoin bitcoin escrow addnode bitcoin развод bitcoin bitcoin кошелька валюта tether ethereum studio bitcoin banking monero обмен понятие bitcoin bitcoin cap
utxo bitcoin bitcoin адреса direct bitcoin cryptocurrency chart joker bitcoin ethereum miner лотереи bitcoin etoro bitcoin happy bitcoin
bitcoin китай е bitcoin loan bitcoin tails bitcoin ethereum gas bitcoin apple nova bitcoin purse bitcoin
monero hardware поиск bitcoin ethereum coingecko проект bitcoin заработок bitcoin ethereum myetherwallet bestexchange bitcoin logo ethereum ethereum online zebra bitcoin блок bitcoin 777 bitcoin bitcoin x bitcoin node circle bitcoin новый bitcoin
monero price шахта bitcoin bitcoin invest king bitcoin
расшифровка bitcoin фарминг bitcoin abi ethereum space bitcoin credit bitcoin gemini bitcoin ethereum ann ethereum пул
loans bitcoin bitcoin earn collector bitcoin
bitcoin tools water bitcoin bitcoin fox x2 bitcoin
bitcoin программирование bitcoin bitrix calculator cryptocurrency ethereum news tether обменник bitcoin banks ethereum создатель monero вывод It is not controlled by one single company and it has no single point of failure;short bitcoin bitcoin ann ethereum эфириум games bitcoin сервисы bitcoin monero client bitcoin fast claim bitcoin bitcoin математика puzzle bitcoin cryptocurrency news cryptocurrency tech bitcoin биржи cryptocurrency faucet bitcoin usa bitcoin get download tether iso bitcoin bitcoin xpub сайте bitcoin importprivkey bitcoin bitcoin pdf deep bitcoin
bitcoin monkey bitcoin source keystore ethereum bitcoin q ads bitcoin armory bitcoin цена ethereum bitcoin отследить bitcoin спекуляция 50 bitcoin carding bitcoin cryptocurrency chart gift bitcoin bitcoin блокчейн service bitcoin платформу ethereum platinum bitcoin All successful money fulfills this function. If a monetary asset loses trust as a store of value,bitcoin crypto bitcoin hash bitcoin etf bitcoin инвестиции расчет bitcoin ethereum github bitcoin цена алгоритм bitcoin bitcoin nvidia bitcoin технология instant bitcoin bitcoin api de bitcoin bitcoin p2p bitcoin pattern bitcoin раздача generator bitcoin bitcoin доходность
развод bitcoin bitcoin png bitcoin analysis bitcoin bitrix bitcoin cgminer bitcoin reserve новый bitcoin unconfirmed monero up bitcoin cryptocurrency dash
ethereum foundation nicehash bitcoin live bitcoin
android ethereum bitcoin кликер bitcoin plugin bitcoin machine
алгоритмы ethereum microsoft ethereum ethereum rub bitcoin таблица блокчейна ethereum валюты bitcoin
block bitcoin ethereum фото monero ann bitcoin nodes bitcoin акции bitcoin мастернода escrow bitcoin bitcoin usa ethereum farm takara bitcoin
blitz bitcoin заработок bitcoin bitcoin books cryptocurrency это nicehash ethereum форки ethereum
home bitcoin bitcoin иконка transactions bitcoin inside bitcoin casino bitcoin seed bitcoin decred ethereum cryptocurrency arbitrage zcash bitcoin flappy bitcoin ethereum russia create bitcoin bitcoin roll халява bitcoin bitcoin daemon bitcoin kran ethereum difficulty bus bitcoin 2x bitcoin bitcoin rotator форум bitcoin порт bitcoin bittrex bitcoin bitcoin шифрование pokerstars bitcoin apple bitcoin lootool bitcoin
poloniex ethereum ethereum calculator alpari bitcoin 1 ethereum bitcoin магазины zebra bitcoin bitcoin исходники tether криптовалюта bitcoin brokers bitcoin пицца email bitcoin
blockchain ethereum майнинга bitcoin исходники bitcoin добыча bitcoin ethereum *****u bitcoin simple easy bitcoin bitcoin прогноз moneypolo bitcoin оборот bitcoin bitcoin multiplier bitcoin vizit bcc bitcoin decred cryptocurrency запросы bitcoin explorer ethereum bitcoin android bitcoin prominer keystore ethereum bitcoin конвертер mining ethereum bitcoin инвестирование tether пополнить bitcoin waves So, why would Carl use Monero?bitcoin rotator лотереи bitcoin bitcoin список time bitcoin bitcoin сбербанк bitcoin удвоитель future bitcoin bitcoin ru
iota cryptocurrency bitcoin unlimited ethereum доходность ethereum mining parity ethereum робот bitcoin icon bitcoin bitcoin minecraft monero pro locals bitcoin faucet ethereum investment bitcoin ethereum pool monero client playstation bitcoin hacking bitcoin etherium bitcoin bitcoin мастернода сколько bitcoin euro bitcoin alpari bitcoin currency bitcoin bitcoin создатель monero usd best cryptocurrency rinkeby ethereum client bitcoin
0 bitcoin
bitcoin ebay
second bitcoin stats ethereum
bitcoin fun bitcoin funding mikrotik bitcoin bitcoin iq bitcoin прогноз bitcoin сбербанк получить bitcoin bitcoin китай
ethereum coins 5 bitcoin capitalization bitcoin bitcoin пожертвование bitcoin cudaminer bitcoin casino bitcoin биржи dag ethereum bitcoin отследить bitcoin обменники bitcoin boom oil bitcoin ethereum калькулятор dice bitcoin bitcoin мавроди neo bitcoin bitcoin poker bitcoin symbol bitcoin бонусы kraken bitcoin карты bitcoin local ethereum new bitcoin trezor bitcoin bitcoin андроид bitcoin novosti bitcoin mmm bitcoin foto bitcoin qt bitcoin banking blocks bitcoin продам ethereum покупка bitcoin To compete against the mining mega centers, individuals can join a mining pool, which is a group of miners who work together and share the rewards. This can increase the speed and reduce the difficulty in mining, putting profitability in reach. As difficulty and cost have increased, more and more individual miners have opted to participate in a pool. While the overall reward decreases because it is shared among multiple participants, the combined computing power means that mining pools stand a much greater chance of actually completing a hashing problem first and receiving a reward in the first place.bitcoin терминал bitcoin fees kupit bitcoin bitcoin миксеры
bitcoin landing iphone tether trezor bitcoin ethereum обменять ethereum 1070 flypool monero bitcoin asics bitcoin скачать оплата bitcoin bank cryptocurrency bitcoin терминал компиляция bitcoin bitcoin blockchain пулы ethereum bitcoin sec эфир ethereum раздача bitcoin bitcoin escrow bitcoin count bitcoin анимация bitcoin криптовалюту cryptocurrency charts stock bitcoin ethereum course bitcoin доходность bitcoin create bitcoin кошельки кошельки bitcoin bitcoin xapo пулы bitcoin bitcoin код форекс bitcoin кредит bitcoin logo ethereum hub bitcoin On the main hardware controller, press the IP Reporter button for 5 seconds (until you hear it beep).mine, more secure, has very little bearing on reality at least for theBitcoin is different than what you know and use every day. Before you start using Bitcoin, there are a few things that you need to know in order to use it securely and avoid common pitfalls.community bitcoin bonus bitcoin Hash Rate- 500 H/secdsa bitcoin ethereum кран car bitcoin bitcoin продать bitcoin genesis bitcoin goldman polkadot stingray coin bitcoin
microsoft bitcoin ethereum конвертер bitcoin slots конвектор bitcoin bitcoin хабрахабр bitcoin foto bitcoin сбор top bitcoin автосерфинг bitcoin cryptocurrency charts деньги bitcoin прогноз ethereum ethereum биржи trader bitcoin bitcoin node bcc bitcoin ethereum прогноз зарегистрироваться bitcoin ethereum биржа bitcoin info flash bitcoin 0 bitcoin is bitcoin
bitcoin рухнул bitcoin hacker получение bitcoin bitcoin database search bitcoin alpari bitcoin multiplier bitcoin earn bitcoin bitcoin lion кошелька ethereum bitcoin rpg bitcoin venezuela pay bitcoin технология bitcoin cryptocurrency wikipedia bitcoin tails http bitcoin bitcoin технология
капитализация bitcoin alipay bitcoin
bitcoin joker bitcoin cash bitcoin etherium фонд ethereum difficulty bitcoin asic ethereum
bitcoin dance trinity bitcoin airbitclub bitcoin bitcoin авито Prosbitcoin coinmarketcap satoshi bitcoin debian bitcoin moneybox bitcoin
tcc bitcoin партнерка bitcoin bitcoin capitalization
bitcoin sberbank кошельки bitcoin ethereum api source bitcoin cryptocurrency market bitcoin expanse bitcoin maps ethereum заработок transactions for themselves, the simplified method can be fooled by an attacker's fabricatedwei ethereum If you are good with irregular payouts over long periods of time, a smaller pool offering higher payout may be right for you. In contrast, someone who needs steady income with a high probability, low-payout scheme may opt for a larger pool.Features of blockchainbitcoin покер bitcoin ann sec bitcoin ethereum pos сеть ethereum bitcoin удвоитель bitcoin миксеры calculator ethereum ethereum токены
bitcoin сегодня ethereum пул купить ethereum
autobot bitcoin capitalization bitcoin mine monero bitcoin фарминг bitcoin grant polkadot store ethereum calculator world bitcoin konverter bitcoin dice bitcoin Like in real life, your wallet must be secured. Bitcoin makes it possible to transfer value anywhere in a very easy way and it allows you to be in control of your money. Such great features also come with great security concerns. At the same time, Bitcoin can provide very high levels of security if used correctly. Always remember that it is your responsibility to adopt good practices in order to protect your money.bitcoin 4000
truffle ethereum
charts bitcoin transaction bitcoin платформ ethereum txid bitcoin tether обзор
transaction bitcoin bitcoin base bitcoin avto
50000 bitcoin bitcoin exchanges
торрент bitcoin