What is Proof of Work?

Similar documents
Consensus & Blockchain

Proof-of-Work & Bitcoin

SpaceMint Overcoming Bitcoin s waste of energy

ENEE 457: E-Cash and Bitcoin

Proof-of-Stake Protocol v3.0

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

Introduction to Cryptoeconomics

Bitcoin Mining. A high-level technical introduction. Konstantinos Karasavvas

As a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins.

BYZANTINE CONSENSUS THROUGH BITCOIN S PROOF- OF-WORK

Security Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

SHIELD FUTURE-PROOFING THE BLOCKCHAIN

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019

SCP: A Computationally Scalable Byzantine Consensus Protocol for Blockchains

Adapting Blockchain Technology for Scientific Computing. Wei Li

Bitcoin (and why it uses SO much energy)

P2P BitCoin: Technical details

Bitcoin and Blockchain

DEV. Deviant Coin, Innovative Anonymity. A PoS/Masternode cr yptocurrency developed with POS proof of stake.

Biomedical Security. Some Security News 10/5/2018. Erwin M. Bakker

Adapting Blockchain Technology for Scientific Computing. Wei Li

Blockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini

BlockFin A Fork-Tolerant, Leaderless Consensus Protocol April

Ergo platform: from prototypes to a survivable cryptocurrency

Problem: Equivocation!

GRADUBIQUE: AN ACADEMIC TRANSCRIPT DATABASE USING BLOCKCHAIN ARCHITECTURE

GENESIS VISION NETWORK

TABLE OF CONTENTS VERSION 3 - NOVEMBER Joe Roets - j03 - [DRAFT] DRAGONCHAIN ARCHITECTURE

Bitcoin, a decentralized and trustless protocol

Matt Howard and Ajay Patel CIS 556: Cryptography University of Pennsylvania Fall DriveCoin: A Proof of Space Cryptocurrency

Blockchains & Cryptocurrencies

Whitepaper Rcoin Global

University of Duisburg-Essen Bismarckstr Duisburg Germany HOW BITCOIN WORKS. Matthäus Wander. June 29, 2011

Candidates Day Modeling the Energy Consumption of. Ryan Cole Liang Cheng. CSE Department Lehigh University

Bitcoin, Security for Cloud & Big Data

Technical White Paper of. MOAC Mother of All Chains. June 8 th, 2017

Ergo platform overview

Introduction to Bitcoin I

Bitcoin. CS6450: Distributed Systems Lecture 20 Ryan Stutsman

Overview & White Paper.

Smalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold

Who wants to be a millionaire? A class in creating your own cryptocurrency

Key concepts of blockchain

SmartPool: practical decentralized pool mining. Loi Luu, Yaron Velner, Jason Teutsch, and Prateek Saxena August 18, 2017

Introduction to Cryptocurrency Ecosystem. By Raj Thimmiah

CS 251: Bitcoin and Crypto Currencies Fall 2015

I. Introduction. II. Security, Coinage and Attacks

About cryptocurrencies and blockchains part 1. Jyväskylä 17th of April 2018 Henri Heinonen

TOPPERCASH TOPPERCASH WHITEPAPER REFORM THE BEST OF BLOCKCHAIN

Alternative Consensus Algorithms. Murat Osmanoglu

How Bitcoin achieves Decentralization. How Bitcoin achieves Decentralization

WOLFCOIN MASTERNODE MANUAL

Radix - Public Node Incentives

A Lightweight Blockchain Consensus Protocol

Ergo platform. Dmitry Meshkov

CRUDE COINS.

ICS 421 & ICS 690. Bitcoin & Blockchain. Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa

Biomedical Security. Cipher Block Chaining and Applications

INTRODUCTION WHY DAPS?

Burstcoin Technical information about mining and block forging

Chapter 13. Digital Cash. Information Security/System Security p. 570/626

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. Yashar Dehkan Asl

arxiv: v2 [cs.cr] 14 Nov 2018

An Introduction to Blockchain and Distributed Ledger Technology

BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW

Ethereum. Campbell R. Harvey* Duke University and NBER. Ashwin Ramachandran Duke University. Brent Xu ConsenSys. Innovation and Cryptoventures

Prelude. The notes within this Whitepaper publication are intended to formally document the concepts and features of the Aegeus cryptocurrency.

Bitcoin. Arni Par ov. December 17, 2013

Transactions as Proof-of-Stake! by Daniel Larimer!

A Gentle Introduction To Bitcoin Mining

ILCOIN White Paper. In ILCOIN We Trust ILCOIN

The game If you listen very carefully during the first 4 cards (or use the cheat sheet) you will get an advantage on the last 5 cards

Crypto tricks: Proof of work, Hash chaining

Proof of Stake Made Simple with Casper

Distributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017

Bitcoin. Cloud Security Mechanisms: Bitcoin Johannes Henning, Robin Schreiber

BaFin-Tech 2018 BlockChain & Security (from #developerview)

1 General Principles; Scope of Application

Technical White Paper. Cube Engine Version 1.0

Biomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs

EVALUATION OF PROOF OF WORK (POW) BLOCKCHAINS SECURITY NETWORK ON SELFISH MINING

Alternatives to Blockchains. Sarah Meiklejohn (University College London)

Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin

Decentralized prediction game platform, powered by public

arxiv: v1 [cs.cr] 31 Aug 2017

An Analysis of Atomic Swaps on and between Ethereum Blockchains Research Project I

SOME OF THE PROBLEMS IN BLOCKCHAIN TODAY

BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air -

CONSENSUS PROTOCOLS & BLOCKCHAINS. Techruption Lecture March 16 th, 2017 Maarten Everts (TNO & University of Twente)

KDC COIN WHITEPAPER KDC COIN WHITEPAPER.

Hyperledger fabric: towards scalable blockchain for business

Reliability, distributed consensus and blockchain COSC412

Neel Gupte. Index Terms Bitcoin, Cryptocurreny, Block Chain, Hashing, Proof-of-Work, Double-spending, Momentum Method, Proof of Stake.

Analyzing the Effects of Network Latency on Blockchain Performance and Security Using the Whiteblock Testing Platform

LECTURE 2 BLOCKCHAIN TECHNOLOGY EVOLUTION

DIGITAL ASSET RESEARCH

Proof of Work, Curl & Nonce

Formally Specifying Blockchain Protocols

Security Analysis of Monero s Peer-to-Peer System

Transcription:

What is Proof of Work? Educational Series September 18, 2018

Overview There are many protocols that regulate how nodes on a blockchain achieve consensus, and currently the most popular is proof-of-work. A blockchain-based proof-of-work system was first implemented with the release of Bitcoin in 2009, although the concept originated in the 1990s. Proof-of-work is a consensus mechanism that relies on a difficult computational task to secure the network from malicious actors. A proof-of-work system has miners: computers that compete to solve the difficult task first. Whichever miner solves it first broadcasts the result to the other miners, who can easily verify that the task has been solved correctly. The system is called proof-of-work because that is what miners are providing the winner computer is finding a piece of data that proves a sufficient amount of computational work has been done to get the right output. 2

Overview (continued) In a proof-of-work system, the more computational power a miner has, the greater chance they have of winning the competition with other miners. The more miners there are competing to find the winning piece of data, the more secure the network becomes. Cryptocurrencies that use a proof-of-work system include Bitcoin (and all forks of Bitcoin), Ethereum, Ethereum Classic, Litecoin, Monero, Dash, Zcash, Decred, and more. 3

History Bitcoin was the first popularized implementation of proof-of-work, but the concept has been around for much longer. The idea was first proposed in a 1993 academic journal by Cynthia Dwork and Moni Naor, although the name proof-of-work was coined by Markus Jakobsson in 1999. In 1997, Adam Back proposed Hashcash a proof-of-work system used to limit email spam and denial of service (DoS) attacks. It worked by requiring a stamp in the form of textual encoding to be added to the header of an email to prove the sender has used a modest amount of CPU time to calculate the stamp prior to sending. The idea was that spammers, who rely on sending many emails with no cost per message, would stop sending spam if each email they sent had a small computational cost. This was one of the first practical implementations of a proof-of-work system. 4

How does it work? On a proof-of-work blockchain, while transactional data is being added to the current block by nodes, other computers called miners are attempting to crack a code that validates the block. The mining process is comparable to guessing a random long password the more computing power you have, the faster you can make guesses thus giving you a better chance to validate the current block. The code is generated through a cryptographic algorithm called hashing, and there is no way to crack the code without trying random combinations through repetition. After validation, the winning miner broadcasts the result and the other miners on the network can prove that the code is correct. At this point the data in the block is sealed and miners move on attempting to guess the next block s code. 5

Incentivization People are incentivized to use their computers as miners through automatically distributed block rewards: the miner that correctly guesses a block s code receives an allocation of new coins tied to that block. The inflation rate is programmed into the blockchain and there is no other way to mint new coins. The winning miner also receives the transaction fees used by every transaction in the block they validated. Incentivization in a proof-of-work system is extremely important because miners are the main actors in protecting the network from malicious actors. 6

Incentivization (continued) Considering there can only be one winner and the number of miners has grown over time, the odds of a single machine guessing the correct code is astronomically low. People have got around this by creating mining pools: networks where people commit their computing power to a pool of other miners. If the pool mines a block, the block reward is proportionally split based on how much computing power each machine provided. This has kept the barrier to entry low for proof-of-work mining. 7

Example of network security Someone wants to send out a malicious transaction on the blockchain to credit their wallet with 10 BTC from a random user s wallet. They broadcast the faulty transaction on their copy of the blockchain, and for it to be accepted as valid, they would have to mine the current block, in turn creating a new fork of the chain that credits them 10 BTC. If they don t mine the block, the miner that does would broadcast their version of the block with its valid data, not including the faulty transaction. Even if they succeed in getting their transaction into a confirmed block, (1) they must continue to solve blocks faster than the rest of the non-malicious miners, and (2) other miners agree that this chain is the valid one. 8

Network security In general, there are two principles to guide which chain is the legitimate chain for a coin the chain with the most blocks, and/or the chain with the most accumulated mining difficulty. To outpace the networks miners over time, 51% of all the networks computing power is required. This is called a 51% attack and is the main security vulnerability in blockchain systems. It s also the reason why a blockchain becomes more secure as the number of miners goes up. 9

Additional resources https://en.bitcoin.it/wiki/proof_of_work https://hackernoon.com/consensus-mechanisms-explained-pow-vs-pos-89951c66ae10 https://bitcoin.stackexchange.com/questions/8031/what-are-bitcoin-miners-reallysolving https://cointelegraph.com/explained/proof-of-work-explained 10