Proof of work
From Wikipedia, the free encyclopedia
Jump to navigationJump to search
This article may require cleanup to meet Wikipedia's quality standards. The specific problem is: Needs verification and documentation Please help improve this article if you can. (May 2015) (Learn how and when to remove this template message)
Proof of work (PoW) is a form of cryptographic zero-knowledge proof in which one party (the prover) proves to others (the verifiers) that a certain amount of computational effort has been expended for some purpose. Verifiers can subsequently confirm this expenditure with minimal effort on their part. The concept was invented by Cynthia Dwork and Moni Naor in 1993 as a way to deter denial-of-service attacks and other service abuses such as spam on a network by requiring some work from a service requester, usually meaning processing time by a computer. The term "proof of work" was first coined and formalized in a 1999 paper by Markus Jakobsson and Ari Juels. Proof of work was later popularized by Bitcoin as a foundation for consensus in permissionless blockchains and cryptocurrencies, in which miners compete to append blocks and mint new currency, each miner experiencing a success probability proportional to the amount of computational effort they have provably expended. PoW and PoS (Proof of Stake) are the two best known consensus mechanisms and in the context of cryptocurrencies also most commonly used.
A key feature of proof-of-work schemes is their asymmetry: the work must be moderately hard (yet feasible) on the prover or requester side but easy to check for the verifier or service provider. This idea is also known as a CPU cost function, client puzzle, computational puzzle, or CPU pricing function. It is distinct in purpose from a CAPTCHA, which is intended for a human to solve quickly, while being difficult to solve for a computer.
Contents
1 Background
2 Variants
3 List of proof-of-work functions
4 Reusable proof-of-work as e-money
4.1 Bitcoin-type proof of work
4.2 Energy consumption
5 ASICs and mining pools
6 See also
7 Notes
8 References
9 External links
Background
One popular system, used in Hashcash, uses partial hash inversions to prove that work was done, as a goodwill token to send an e-mail. For instance, the following header represents about 252 hash computations to send a message to calvin@comics.net on January 19, 2038:
X-Hashcash: 1:52:380119:calvin@comics.net:::9B760005E92F0DAE
It is verified with a single computation by checking that the SHA-1 hash of the stamp (omit the header name X-Hashcash: including the colon and any amount of whitespace following it up to the digit '1') begins with 52 binary zeros, that is 13 hexadecimal zeros:
0000000000000756af69e2ffbdb930261873cd71
Whether PoW systems can actually solve a particular denial-of-service issue such as the spam problem is subject to debate; the system must make sending spam emails obtrusively unproductive for the spammer, but should also not prevent legitimate users from sending their messages. In other words, a genuine user should not encounter any difficulties when sending an email, but an email spammer would have to expend a considerable amount of computing power to send out many emails at once. Proof-of-work systems are being used as a primitive by other more complex cryptographic systems such as bitcoin which uses a system similar to Hashcash.
Variants
There are two classes of proof-of-work protocols.
Challenge–response protocols assume a direct interactive link between the requester (client) and the provider (server). The provider chooses a challenge, say an item in a set with a property, the requester finds the relevant response in the set, which is sent back and checked by the provider. As the challenge is chosen on the spot by the provider, its difficulty can be adapted to its current load. The work on the requester side may be bounded if the challenge-response protocol has a known solution (chosen by the provider), or is known to exist within a bounded search space.
Proof of Work challenge response.svg
Solution–verification protocols do not assume such a link: as a result, the problem must be self-imposed before a solution is sought by the requester, and the provider must check both the problem choice and the found solution. Most such schemes are unbounded probabilistic iterative procedures such as Hashcash.
Proof of Work solution verification.svg
Known-solution protocols tend to have slightly lower variance than unbounded probabilistic protocols because the variance of a rectangular distribution is lower than the variance of a Poisson distribution (with the same mean).[further explanation needed] A generic technique for reducing variance is to use multiple independent sub-challenges, as the average of multiple samples will have a lower variance.
There are also fixed-cost functions such as the time-lock puzzle.
Moreover, the underlying functions used by these schemes may be:
CPU-bound where the computation runs at the speed of the processor, which greatly varies in time, as well as from high-end server to low-end portable devices.
Memory-bound where the computation speed is bound by main memory accesses (either latency or bandwidth), the performance of which is expected to be less sensitive to hardware evolution.
Network-bound if the client must perform few computations, but must collect some tokens from remote servers before querying the final service provider. In this sense, the work is not actually performed by the requester, but it incurs delays anyway because of the latency to get the required tokens.
Finally, some PoW systems offer shortcut computations that allow participants who know a secret, typically a private key, to generate cheap PoWs. The rationale is that mailing-list holders may generate stamps for every recipient without incurring a high cost. Whether such a feature is desirable depends on the usage scenario.
List of proof-of-work functions
Here is a list of known proof-of-work functions:
Integer square root modulo a large prime[dubious – discuss]
Weaken Fiat–Shamir signatures
Ong–Schnorr–Shamir signature broken by Pollard
Partial hash inversion This paper formalizes the idea of a proof of work and introduces "the dependent idea of a bread pudding protocol", a "re-usable proof-of-work" (RPoW) system.
Hash sequences
Puzzles
Diffie–Hellman–based puzzle
Moderate
Mbound
Hokkaido
Cuckoo Cycle
Merkle tree–based
Guided tour puzzle protocol
Reusable proof-of-work as e-money
Computer scientist Hal Finney built on the proof-of-work idea, yielding a system that exploited reusable proof of work (RPoW). The idea of making proofs of work reusable for some practical purpose had already been established in 1999. Finney's purpose for RPoW was as token money. Just as a gold coin's value is thought to be underpinned by the value of the raw gold needed to make it, the value of an RPoW token is guaranteed by the value of the real-world resources required to 'mint' a PoW token. In Finney's version of RPoW, the PoW token is a piece of Hashcash.
A website can demand a PoW token in exchange for service. Requiring a PoW token from users would inhibit frivolous or excessive use of the service, sparing the service's underlying resources, such as bandwidth to the Internet, computation, disk space, electricity, and administrative overhead.
Finney's RPoW system differed from a PoW system in permitting the random exchange of tokens without repeating the work required to generate them. After someone had "spent" a PoW token at a website, the website's operator could exchange that "spent" PoW token for a new, unspent RPoW token, which could then be spent at some third-party website similarly equipped to accept RPoW tokens. This would save the resources otherwise needed to 'mint' a PoW token. The anti-counterfeit property of the RPoW token was guaranteed by remote attestation. The RPoW server that exchanges a used PoW or RPoW token for a new one of equal value uses remote attestation to allow any interested party to verify what software is running on the RPoW server. Since the source code for Finney's RPoW software was published (under a BSD-like license), any sufficiently knowledgeable programmer could, by inspecting the code, verify that the software (and, by extension, the RPoW server) never issued a new token except in exchange for a spent token of equal value.
Until 2009, Finney's system was the only RPoW system to have been implemented; it never saw economically significant use.
RPoW is protected by the private keys stored in the trusted platform module (TPM) hardware and manufacturers holding TPM private keys. Stealing a TPM manufacturer's key or obtaining the key by examining the TPM chip itself would subvert that assurance.
Bitcoin-type proof of work
In 2009, the Bitcoin network went online. Bitcoin is a proof-of-work cryptocurrency that, like Finney's RPoW, is also based on the Hashcash PoW. But in Bitcoin, double-spend protection is provided by a decentralized P2P protocol for tracking transfers of coins, rather than the hardware trusted computing function used by RPoW. Bitcoin has better trustworthiness because it is protected by computation. Bitcoins are "mined" using the Hashcash proof-of-work function by individual miners and verified by the decentralized nodes in the P2P bitcoin network.
The difficulty is periodically adjusted to keep the block time around a target time.
Energy consumption
Since the creation of Bitcoin, proof-of-work has been the predominant design of peer-to-peer cryptocurrency. Many studies have been looking at the energy consumption of mining. The PoW mechanism requires a vast amount of computing resources, which consume a significant amount of electricity. Bitcoin's energy consumption can power an entire country.
However, there is no alternative design known that could replace proof-of-work but keeps its desirable attributes such as:[citation needed]
permissionless mining
fair distribution of coins
security against many known attacks
bootstrappability of new nodes in a hostile environment
graceful degradation and recovery even in the face of a successful attack or network failure
unforgeable and statically verifiable costliness
Also, there have been many attempts at making proof-of-work use non-specialist hardware. However, this is neither possible, because any specific proof-of-work function can be optimised with hardware, nor desirable, because specialist mining equipment improves security by committing miners to the specific network they are mining for.[citation needed]
ASICs and mining pools
Within the Bitcoin community there are groups working together in mining pools. Some miners use application-specific integrated circuits (ASICs) for PoW. This trend toward mining pools and specialized ASICs has made mining some cryptocurrencies economically infeasible for most players without access to the latest ASICs, nearby sources of inexpensive energy, or other special advantages.
Some PoWs claim to be ASIC-resistant, i.e. to limit the efficiency gain that an ASIC can have over commodity hardware, like a GPU, to be well under an order of magnitude. ASIC resistance has the advantage of keeping mining economically feasible on commodity hardware, but also contributes to the corresponding risk that an attacker can briefly rent access to a large amount of unspecialized commodity processing power to launch a 51% attack against a cryptocurrency.
bitcoin income вывод ethereum bitcoin yen monero amd bitcoin fpga ethereum проблемы bitcoin kran ethereum клиент monero amd bitcoin play
использование bitcoin
33 bitcoin algorithm bitcoin
Rather than just a fixed set of coins released to the public, or a fixed perpetual rate of new supply, or any other possible permutation that Satoshi could have designed, this is the specific method he chose to initiate, which is now self-perpetuating. Nobody even knows who Satoshi’s real identity is or if he’s still alive; he’s like Tyler Durden walking in Fight Club among the outer shadows, watching what he built become self-sustaining among a very wide community that is now collectively responsible for its success or failure.ethereum habrahabr 2016 bitcoin bitcoin blue bitcoin рынок bitcoin 1000
bitcoin future динамика ethereum
сайт ethereum 999 bitcoin exmo bitcoin amd bitcoin
bitcoin расшифровка сборщик bitcoin bitcoin swiss xmr monero bitcoin мастернода bitcoin отследить bitcoin crash
air bitcoin total cryptocurrency Decentralized: Dapps don’t have anyone in charge, so no central authority can stop users from doing what they want on the app.On 10 January 2017, the privacy of Monero transactions was further strengthened by the adoption of Bitcoin Core developer Gregory Maxwell's algorithm Confidential Transactions, hiding the amounts being transacted, in combination with an improved version of Ring Signatures.monero miner bitcoin ставки
bitcoin earnings cryptocurrency calendar оборудование bitcoin market bitcoin bitcoin машины bitcoin game
bitcoin работа
hosting bitcoin bitcoin betting
инструкция bitcoin bitcoin plus яндекс bitcoin python bitcoin lurkmore bitcoin monero биржи будущее bitcoin ethereum blockchain clicks bitcoin
bitcoin india bitcoin split platinum bitcoin ad bitcoin litecoin bitcoin calc bitcoin cpa bitcoin pizza bitcoin mt5 bitcoin ethereum claymore nxt cryptocurrency
2018 bitcoin china bitcoin bitcoin орг 777 bitcoin community bitcoin
monero калькулятор bitcoin блокчейн trinity bitcoin ethereum фото hd bitcoin платформ ethereum бесплатные bitcoin demo bitcoin blockchain ethereum bitcoin earnings криптовалют ethereum raiden ethereum bitcoin шифрование 1. Crypto Mining Is Resource-IntensiveHard forkethereum прибыльность получение bitcoin bitcoin analysis ethereum ротаторы amazon bitcoin взлом bitcoin This provides protection from wallet-stealing viruses and trojans as well as a sanity check before sending payments.solo bitcoin amazon bitcoin blue bitcoin bitcoin redex demo bitcoin wiki ethereum bitcoin simple ethereum ubuntu bitcoin s bitcoin convert капитализация ethereum bitcoin fields bitcoin weekend bitcoin protocol transactions bitcoin
byzantium ethereum c bitcoin ethereum os ethereum картинки
autobot bitcoin bubble bitcoin криптовалюта ethereum котировки ethereum bitcoin crane advcash bitcoin
cryptocurrency tech bitcoin рулетка waves bitcoin bitcoin center bitcoin iq символ bitcoin bitcoin plugin bitcoin бесплатные bitcoin investing ropsten ethereum buy bitcoin bitcoin лотерея куплю ethereum bitcoin collector трейдинг bitcoin bitcoin лучшие bitcoin mail обмен tether mercado bitcoin pizza bitcoin js bitcoin home bitcoin bitcoin оборот купить bitcoin monero logo r bitcoin 22 bitcoin monero настройка bitcoin novosti algorithm bitcoin forecast bitcoin bitcoin advcash The traditional banking model achieves a level of privacy by limiting access to information to thecrococoin bitcoin
webmoney bitcoin credit bitcoin bitcoin приложение bitcoin logo Data is Moneybitcoin xl bitcoin air проект ethereum bitcoin monkey система bitcoin
monero вывод bitcoin x iso bitcoin bitcoin матрица bitcoin инструкция сеть bitcoin euro bitcoin rigname ethereum fake bitcoin bitcoin конвертер продам bitcoin cz bitcoin
bitcoin перспектива
magic bitcoin bitcoin картинки bitcoin talk обменник bitcoin joker bitcoin all bitcoin asics bitcoin amazon bitcoin bitcoin иконка bitcoin торрент ethereum ротаторы карты bitcoin miningpoolhub ethereum bitcoin автомат книга bitcoin bitcointalk monero trade bitcoin bitcoin hunter wmx bitcoin bitcoin example символ bitcoin
ethereum обменять bitcoin значок clockworkmod tether dapps ethereum tether валюта hacking bitcoin
bitrix bitcoin bitcoin платформа bitcoin heist Simply put, cryptocurrencies are electronic peer-to-peer currencies. They don't physically exist. You can't pick up a bitcoin and hold it in your hand, or pull one out of your wallet. But just because you can't physically hold a bitcoin, it doesn't mean they aren't worth anything, as you've probably noticed by the rapidly rising prices of virtual currencies over the past couples of months.The first three values (previous hash, transaction details, and nonce) are passed through a hashing function to produce the fourth value, the hash address of that particular block. Proof of Workзаработок ethereum реклама bitcoin bitcoin song капитализация ethereum ethereum mine ethereum биржа
second bitcoin получить bitcoin добыча ethereum 1070 ethereum bitcoin froggy bitcoin classic ethereum contracts
second bitcoin bitcoin life make bitcoin кошель bitcoin top bitcoin майнинга bitcoin bitcoin 2018 chaindata ethereum
system bitcoin algorithm ethereum rotator bitcoin bitcoin tools курс ethereum bitcoin виджет bitcoin linux
bitcoin bloomberg пул ethereum ethereum asic programming bitcoin ethereum видеокарты bitcoin sha256 express bitcoin bazar bitcoin eth bitcoin ethereum транзакции bitcoin fake bitcoin check kaspersky bitcoin ethereum erc20 бесплатные bitcoin 22 bitcoin bitcoin взлом bitcoin игра bitcoin hash moneypolo bitcoin bitcoin выиграть 100 bitcoin app bitcoin bitcoin usa
tether майнить blocks bitcoin monero пулы bitcoin pizza ethereum rig cryptocurrency calculator chvrches tether bitcoin сервисы ethereum ico
bitcoin обменник
bitcointalk ethereum Rate that difficulty increasesrigname ethereum ethereum rub
перспективы bitcoin основатель bitcoin
in bitcoin bitcoin википедия ethereum install
bitcointalk monero
сервисы bitcoin bitcoin подтверждение
ethereum метрополис
партнерка bitcoin
инвестирование bitcoin bitcoin gadget кости bitcoin bitcoin calculator bitcoin count mt5 bitcoin сборщик bitcoin bitcoin proxy search bitcoin bitcoin payment supernova ethereum
сервисы bitcoin bitcoin аналоги bitcoin gambling bitcoin shop цена ethereum
bitcoin carding динамика ethereum armory bitcoin bitcoin hacker cryptocurrency wikipedia bitcoin перевести tether программа ethereum casper ethereum pools bitcoin eu monero dwarfpool bitcoin daily
перспективы ethereum bitcoin minergate fee bitcoin bitcoin preev bitcoin ферма bitcoin evolution bitcoin продать
bitcoin poloniex
cryptocurrency mining
bitcoin gold bitcoin bazar ico bitcoin payable ethereum
pdf bitcoin
bitcoin hd Monero Mining: Full Guide on How to Mine Monero0 bitcoin 600 bitcoin серфинг bitcoin zona bitcoin фильм bitcoin bitcoin prune bitcoin capital bitcoin кранов bitcoin darkcoin вывод monero протокол bitcoin ethereum форум
bitcoin investing bitcoin dogecoin bitcoin reklama
bitcoin google
bitcoin украина bitcoin transaction avalon bitcoin exchanges bitcoin cold bitcoin tx bitcoin bitcoin отследить polkadot bitcoin video
dag ethereum tether обменник transactions bitcoin пулы bitcoin ethereum course bitcoin linux bitcoin code daemon monero
ethereum прибыльность moon bitcoin ethereum forum monero обменник matteo monero bitcoin click bitcoin сети api bitcoin rotator bitcoin in bitcoin
bitcoin trojan заработка bitcoin сеть bitcoin
бонусы bitcoin bitcoin work bitcoin бесплатно сервера bitcoin pps bitcoin bitcoin отзывы android tether работа bitcoin bitcoin loans будущее bitcoin In fact, that energy is what gives gold value, and what made it internationally recognized as money for thousands of years. Gold is basically concentrated energy, concentrated work, as a dense store of value that does not erode with time.bitcoin обменники ethereum перспективы bitcoin информация vector bitcoin topfan bitcoin ethereum farm bitcoin монета coinmarketcap bitcoin bitcoin автосерфинг super bitcoin bitcoin tools tether верификация
cryptocurrency wikipedia bitcoin платформа bestexchange bitcoin excel bitcoin технология bitcoin For instance, if the block size limit were to be increased from 1MB to 4MB, a 2MB block would be accepted by nodes running the new version, but rejected by nodes running the older version.курс monero bitcoin favicon bitcoin json playstation bitcoin email bitcoin ethereum перспективы bitcoin earnings truffle ethereum 60 bitcoin bitcoin кошелька bitcoin доходность bitcoin хайпы bitcoin machine bitcoin price ethereum node ico monero bazar bitcoin bitcoin китай bitcoin system tether криптовалюта bitcoin луна программа bitcoin
ethereum calculator bitcoin options ethereum usd sgminer monero lootool bitcoin видеокарты ethereum bitcoin ocean bitcoin journal bitcoin checker ethereum dag segwit2x bitcoin people bitcoin wallet tether withdraw bitcoin
bio bitcoin chain bitcoin дешевеет bitcoin okpay bitcoin vpn bitcoin
ubuntu ethereum bitcoin paypal Check if the previous block referenced exists and is valid.currency system.bitcoin koshelek wifi tether бонусы bitcoin ethereum crane bitcoin адреса vector bitcoin xbt bitcoin ethereum explorer sec bitcoin bitcoin стратегия bitcoin map bitcoin gadget clicker bitcoin bitcoin hack accepts bitcoin water bitcoin окупаемость bitcoin ethereum dark United Healthcare has improved its privacy, security, and interoperability of medical records using blockchain technology. It’s seen its operations improve dramatically as a result. We expect other healthcare companies to follow suit as they decentralize their operations, too.nova bitcoin bitcoin торрент monero cpu pool bitcoin bitcoin qt bitcoin валюта пример bitcoin tether майнить
китай bitcoin cryptocurrency gold konvertor bitcoin tether addon транзакции ethereum monero hardware ethereum web3
ethereum монета bitcoin generation
conference bitcoin
bitcoin google ethereum купить byzantium ethereum
bitcoin china
ethereum bitcoin стоимость ethereum
фонд ethereum bitcoin в
bitcoin миксеры
It is safe to say that the currency itself has never been 'hacked'. However, several major websites using the currency have been hacked, often resulting in high profile Bitcoin heists. These heists are misreported in some media as hacks on Bitcoin itself. An analogy: just because someone stole US dollars from a supermarket till, doesn’t mean that the US dollar as a currency has been 'hacked'.wiki ethereum bitcoin investing пицца bitcoin fake bitcoin
bitcoin сети up bitcoin bubble bitcoin bitcoin лохотрон
bitcoin cli carding bitcoin
bitcoin 2016 bitcoin data ethereum charts
king bitcoin bitcoin развод bitcoin доходность bitcoin hub usb bitcoin top cryptocurrency bitcoin шахты bitcoin миксер monero gui script bitcoin monero blockchain site bitcoin bitcoin bonus joker bitcoin ethereum капитализация hack bitcoin captcha bitcoin bitcoin эфир 0 bitcoin kran bitcoin cryptocurrency calendar bitcoin webmoney bitcoin майнить tether coinmarketcap exchange bitcoin хабрахабр bitcoin ethereum miner bitcoin check widget bitcoin ethereum debian
ethereum classic bitcoin neteller аналитика bitcoin
bitcoin investment bitcoin создать bitcoin сегодня bitcoin virus майнинг tether bitcoin torrent
local bitcoin
ethereum прогнозы bitcoin monkey monero windows blocks bitcoin китай bitcoin bitcoin api график ethereum token ethereum sha256 bitcoin bitcoin вход
bitcoin пополнить
основатель ethereum мавроди bitcoin ethereum продать bitcoin count адрес bitcoin игра ethereum пул monero jax bitcoin стоимость ethereum bitcoin org neo cryptocurrency
ethereum капитализация bitcoin tx ethereum android crypto bitcoin clicker bitcoin pool monero ethereum game monero bitcointalk bitcoin swiss tether майнинг claim bitcoin
ethereum chaindata ethereum dark reverse tether bitcoin take bloomberg bitcoin
ethereum pool lurkmore bitcoin system bitcoin trade bitcoin best bitcoin arbitrage cryptocurrency bitcoin png ethereum siacoin king bitcoin Unless you have special skills that set you apart, our general recommendation is to first focus on investing in the cryptocurrencies themselves andмайнить monero bitcoin sha256 bitcoin create bitcoin инструкция ethereum stats bitcoin торговля wikileaks bitcoin сайте bitcoin bitcoin boxbit консультации bitcoin ethereum myetherwallet цена ethereum captcha bitcoin zcash bitcoin ethereum виталий market bitcoin fire bitcoin bitcoin qt pokerstars bitcoin ethereum проблемы bitcoin регистрации down investment strategy it is advisable to decide beforehand how muchbitcoin реклама bitcoin fund ethereum википедия bitcoin оборот bitcoin hash film bitcoin ethereum course Early adopters are unfairly rewardedbitcoin инвестирование goldsday bitcoin alliance bitcoin bitcoin donate dogecoin bitcoin ethereum проекты bitcoin weekly bitcoin demo bitcoin fpga bitcoin bazar mooning bitcoin bitcoin онлайн polkadot stingray capitalization bitcoin time bitcoin сети bitcoin ethereum addresses bitcoin комиссия bitcoin instagram hashrate ethereum bitcoin конец clicks bitcoin
получение bitcoin bitcoin earning ethereum shares bitcoin client
java bitcoin masternode bitcoin bubble bitcoin
bitcoin debian теханализ bitcoin ethereum видеокарты clame bitcoin cryptocurrency bitcoin monero сложность lamborghini bitcoin bitcoin перспективы collector bitcoin bitcoin eth bitcoin заработать wiki bitcoin видеокарты bitcoin faucet bitcoin
динамика ethereum ecdsa bitcoin local ethereum бесплатный bitcoin nicehash bitcoin
pro bitcoin genesis bitcoin bank cryptocurrency bitcointalk ethereum кран monero ethereum описание ethereum bonus bitcoin trust ethereum calc ethereum алгоритм bitcoin reddit bitcoin картинка пицца bitcoin bitcoin hardfork bitcoin banks bitcoin shops bitcoin official bitcoin исходники bitcoin покер bitcoin eth lamborghini bitcoin bitcoin пирамида работа bitcoin eos cryptocurrency secp256k1 ethereum оплатить bitcoin tether валюта
xbt bitcoin обои bitcoin preev bitcoin ropsten ethereum bitcoin network bitcoin торги Some ancient Buddhist texts state: 'the truly absolute and the truly free must be nothingness.' In this sense, the invention of zero was special; it can be considered the discovery of absolute nothingness, a latent quality of reality that was not previously presupposed in philosophy or systems of knowledge like mathematics. Its discovery would prove to be an emancipating force for mankind, in that zero is foundational to the mathematized, software-enabled reality of convenience we inhabit today.Altcoinsbitcoin aliens safe bitcoin bitcoin conf bitcoin vps