Knowledge (XXG)

Proof of work

Source đź“ť

492:, and their solutions must be agreed upon by all nodes and reach consensus. The solutions are then used to validate transactions, add blocks and generate new bitcoins. Miners are rewarded for solving these puzzles and successfully adding new blocks. However, the Bitcoin-style mining process is very energy intensive because the proof of work shaped like a lottery mechanism. The underlying computational work has no other use but to provide security to the network that provides open access and has to work in adversarial conditions. Miners have to use a lot of energy to add a new block containing a transaction to the blockchain. The energy used in this competition is what fundamentally gives bitcoin its level of security and resistance to attacks. Also, miners have to invest computer hardwares that need large spaces as fixed cost. 4603: 4627: 241: 4615: 221: 417: 4573: 3474: 2396: 3498: 3486: 2406: 215:
protocols assume a direct interactive link between the requester (client) and the provider (server). The provider chooses a challenge, say an item in a set with a property, the requester finds the relevant response in the set, which is sent back and checked by the provider. As the challenge is chosen
445:
Each block that is added to the blockchain, starting with the block containing a given transaction, is called a confirmation of that transaction. Ideally, merchants and services that receive payment in the cryptocurrency should wait for at least one confirmation to be distributed over the network,
195:
Whether PoW systems can actually solve a particular denial-of-service issue such as the spam problem is subject to debate; the system must make sending spam emails obtrusively unproductive for the spammer, but should also not prevent legitimate users from sending their messages. In other words, a
469:
Some PoWs claim to be ASIC-resistant, i.e. to limit the efficiency gain that an ASIC can have over commodity hardware, like a GPU, to be well under an order of magnitude. ASIC resistance has the advantage of keeping mining economically feasible on commodity hardware, but also contributes to the
151:
was designed as an anti-spam mechanism that required email senders to perform a small computational task, effectively proving that they expended resources (in the form of CPU time) before sending an email. This task was trivial for legitimate users but would impose a significant cost on spammers
403:
PoW. But in Bitcoin, double-spend protection is provided by a decentralized P2P protocol for tracking transfers of coins, rather than the hardware trusted computing function used by RPoW. Bitcoin has better trustworthiness because it is protected by computation. Bitcoins are "mined" using the
446:
before assuming that the payment was done. The more confirmations that the merchant waits for, the more difficult it is for an attacker to successfully reverse the transaction in a blockchain—unless the attacker controls more than half the total network power, in which case it is called a
293:
computations that allow participants who know a secret, typically a private key, to generate cheap PoWs. The rationale is that mailing-list holders may generate stamps for every recipient without incurring a high cost. Whether such a feature is desirable depends on the usage scenario.
231:
protocols do not assume such a link: as a result, the problem must be self-imposed before a solution is sought by the requester, and the provider must check both the problem choice and the found solution. Most such schemes are unbounded probabilistic iterative procedures such as
196:
genuine user should not encounter any difficulties when sending an email, but an email spammer would have to expend a considerable amount of computing power to send out many emails at once. Proof-of-work systems are being used by other, more complex cryptographic systems such as
284:
if the client must perform few computations, but must collect some tokens from remote servers before querying the final service provider. In this sense, the work is not actually performed by the requester, but it incurs delays anyway because of the latency to get the required
130:
was carried out or that a computational puzzle was "solved", but deterring manipulation of data by establishing large energy and hardware-control requirements to be able to do so. Proof-of-work systems have been criticized by environmentalists for their energy consumption.
155:
Hashcash's system was based on the concept of finding a hash value that met certain criteria, a task that required computational effort and thus served as a "proof of work." The idea was that by making it computationally expensive to send large volumes of email,
216:
on the spot by the provider, its difficulty can be adapted to its current load. The work on the requester side may be bounded if the challenge-response protocol has a known solution (chosen by the provider), or is known to exist within a bounded search space.
466:(ASICs) for PoW. This trend toward mining pools and specialized ASICs has made mining some cryptocurrencies economically infeasible for most players without access to the latest ASICs, nearby sources of inexpensive energy, or other special advantages. 518:
in to continue mining without the use of renewable energy but they will not be allowed to expand or renew permits with the state, no new mining companies that do not completely use renewable energy will not also not be allowed to begin mining.
428:
cryptocurrency. Studies have estimated the total energy consumption of cryptocurrency mining. The PoW mechanism requires a vast amount of computing resources, which consume a significant amount of electricity. 2018 estimates from the
378:
based on "proof of useful work" (PoUW). Rather than miners consuming energy in solving complex, but essentially useless, puzzles to validate transactions, Ofelimos achieves consensus while simultaneously providing a decentralized
935: 87:
in a permissionless decentralized network, in which miners compete to append blocks and mine new currency, each miner experiencing a success probability proportional to the computational effort expended. PoW and PoS
1827: 107:– the computation – must be moderately hard (yet feasible) on the prover or requester side but easy to check for the verifier or service provider. This idea is also known as a CPU cost function, 52:) that a certain amount of a specific computational effort has been expended. Verifiers can subsequently confirm this expenditure with minimal effort on their part. The concept was invented by 1898:
Describes a complete money system (including generation, storage, assay, and transfer) based on proof of work functions and the machine architecture problem raised by the use of these functions.
383:. The protocol is built around Doubly Parallel Local Search (DPLS), a local search algorithm that is used as the PoUW component. The paper gives an example that implements a variant of 68:
on a network by requiring some work from a service requester, usually meaning processing time by a computer. The term "proof of work" was first coined and formalized in a 1999 paper by
921: 831: 4553: 4383: 255:(with the same mean). A generic technique for reducing variance is to use multiple independent sub-challenges, as the average of multiple samples will have a lower variance. 1857: 139:
The concept of Proof of Work (PoW) has its roots in early research on combating spam and preventing denial-of-service attacks. One of the earliest implementations of PoW was
404:
Hashcash proof-of-work function by individual miners and verified by the decentralized nodes in the P2P bitcoin network. The difficulty is periodically adjusted to keep the
1603: 278:
where the computation speed is bound by main memory accesses (either latency or bandwidth), the performance of which is expected to be less sensitive to hardware evolution.
371: 1018: 1270: 1819: 4236: 4156: 3544: 1960: 3573: 2442: 2158: 1448: 1514: 496: 3434: 1668: 2117: 463: 870: 189:
including the colon and any amount of whitespace following it up to the digit '1') begins with 52 binary zeros, that is 13 hexadecimal zeros:
3414: 1400: 1246: 1186: 1110: 730: 1646: 818: 4607: 4100: 899: 3933: 470:
corresponding risk that an attacker can briefly rent access to a large amount of unspecialized commodity processing power to launch a
163:
One popular system, used in Hashcash, uses partial hash inversions to prove that computation was done, as a goodwill token to send an
4229: 3424: 1930: 248: 1849: 998: 765: 736: 1965: 1595: 1312: 794: 335: 3537: 2825: 2011: 1738: 483: 247:
Known-solution protocols tend to have slightly lower variance than unbounded probabilistic protocols because the variance of a
73: 4432: 4141: 3626: 3578: 2435: 2269: 3928: 3404: 2830: 2112: 1331: 4593: 4222: 4146: 2876: 2535: 2286: 573: 375: 84: 4657: 4548: 4503: 4316: 3915: 3557: 3553: 2480: 2249: 359: 4427: 3530: 3318: 2950: 1417:
Juels, Ari; Brainard, John (1999). "Client puzzles: A cryptographic defense against connection depletion attacks".
1192: 313: 4652: 4543: 4172: 3811: 3490: 3478: 3444: 3419: 3399: 3074: 3064: 2871: 2428: 2264: 2102: 1902: 380: 322:
Partial hash inversion This paper formalizes the idea of a proof of work and introduces "the dependent idea of a
1850:"New York governor signs first-of-its-kind law cracking down on bitcoin mining — here's everything that's in it" 1692: 399:
network went online. Bitcoin is a proof-of-work digital currency that, like Finney's RPoW, is also based on the
4533: 4523: 4378: 4151: 3987: 3686: 3681: 3502: 3449: 3369: 3089: 61: 1138: 1481: 4528: 4518: 4321: 4281: 4274: 4264: 4259: 4074: 3894: 3127: 3003: 2983: 2598: 1437: 430: 323: 1627: 1503: 4269: 4182: 3568: 3384: 3230: 3117: 2955: 2940: 2925: 2851: 2792: 2751: 2470: 2363: 1224: 108: 4647: 4576: 4422: 4368: 4197: 3847: 3801: 3691: 3649: 3634: 3616: 3439: 3394: 3054: 3024: 2960: 2772: 2746: 2737: 2490: 2485: 2475: 2259: 2193: 2148: 2107: 1991: 1923: 1664: 1050: 568: 434: 240: 127: 76:
in 2004 through the idea of "reusable proof of work" using the 160-bit secure hash algorithm 1 (SHA-1).
2988: 374:
conference Crypto 2022 researchers presented a paper describing Ofelimos, a blockchain protocol with a
4614: 1289: 1219:
Abliz, Mehmud; Znati, Taieb (December 2009). "A Guided Tour Puzzle for Denial of Service Prevention".
4538: 4462: 3867: 3771: 3721: 3696: 3059: 2978: 2945: 2930: 2856: 1986: 1955: 252: 1547: 1229: 1021:, a specific comparison that shows how different classes of devices have different processing power. 862: 220: 4301: 4192: 4069: 4018: 3957: 3776: 3736: 3716: 3240: 2993: 2920: 2409: 2071: 1366: 926: 826: 553: 416: 4631: 4407: 4391: 4338: 4126: 4110: 4059: 3644: 3044: 2998: 2544: 2515: 2495: 2316: 2254: 2061: 1950: 1800: 1730: 1643: 1264: 1252: 1084: 643: 543: 1572: 1474:"An (almost) constant-effort solution-verification proof-of-work protocol based on Merkle trees" 1384: 1375: 167:. For instance, the following header represents about 2 hash computations to send a message to 4467: 4457: 4328: 4003: 3301: 2777: 2505: 2500: 2208: 2163: 1880: 1792: 1396: 1242: 1182: 1106: 726: 635: 306: 116: 65: 4402: 4090: 4044: 3806: 3459: 3409: 3389: 3245: 3225: 3195: 2915: 2910: 2891: 2648: 2399: 2322: 2066: 2026: 2021: 1916: 1782: 1772: 1722: 1388: 1234: 1174: 1096: 891: 716: 673: 625: 511: 507: 69: 4619: 4105: 4054: 4049: 3837: 3429: 3379: 3190: 2338: 2294: 2133: 2041: 1893: 1884: 1696: 1650: 1631: 1063: 1034: 994: 4477: 4397: 4358: 4306: 4291: 4095: 3823: 3255: 3185: 3135: 3039: 2811: 2782: 2554: 2549: 2520: 2451: 2376: 2353: 2143: 2001: 1981: 931: 757: 708: 563: 558: 538: 500: 269: 97: 89: 786: 4641: 4558: 4513: 4472: 4452: 4348: 4311: 4286: 4064: 3766: 3308: 2086: 2046: 2031: 1804: 1734: 1433: 1370: 1080: 1038: 700: 647: 548: 57: 41: 1710: 1256: 510:
enacted a two-year moratorium on cryptocurrency mining that does not completely use
111:, computational puzzle, or CPU pricing function. Another common feature is built-in 4508: 4353: 4343: 4333: 4296: 4245: 2706: 2593: 2381: 2229: 2224: 2168: 2076: 847:
the two best-known – and in the context of cryptocurrencies also most commonly used
425: 93: 38: 1777: 1760: 995:"Proof of Work can work - Fifth Workshop on the Economics of Information Security" 1101: 1095:. Lecture Notes in Computer Science. Vol. 2729. Springer. pp. 426–444. 678: 665: 612:
Lachtar, Nada; Elkhail, Abdulrahman Abu; Bacha, Anys; Malik, Hafiz (2020-07-01).
471: 447: 4487: 4177: 4023: 3952: 3948: 3857: 3454: 3343: 3215: 3079: 2371: 2153: 2056: 1178: 715:. Lecture Notes in Computer Science. Vol. 740. Springer. pp. 139–147. 592: 515: 459: 424:
Since the creation of Bitcoin, proof-of-work has been the predominant design of
353: 176: 169: 1342: 1173:. Lecture Notes in Computer Science. Vol. 8976. Springer. pp. 49–62. 4447: 4417: 4412: 4373: 3374: 3265: 3210: 3097: 3049: 2970: 2672: 2667: 2465: 2138: 2036: 2006: 978:
Laurie, Ben; Clayton, Richard (May 2004). "Proof-of-work proves not to work".
958: 533: 405: 115:-structures that reward allocating computational capacity to the network with 1796: 1392: 721: 639: 630: 613: 499:
Erik Thedéen called on the EU to ban the proof of work model in favor of the
17: 4437: 3852: 3205: 3107: 3034: 2935: 2787: 2051: 1996: 1088: 704: 144: 123: 112: 53: 3639: 1726: 1238: 4482: 4442: 4131: 4028: 4013: 4008: 3998: 3962: 3882: 3796: 3676: 3200: 3180: 3160: 3150: 3145: 3069: 3029: 3008: 2866: 2846: 2840: 2820: 2797: 2767: 2697: 2687: 2682: 2642: 2633: 2618: 2613: 2608: 2510: 2348: 2343: 2081: 1890: 1709:
Savva Shanaev; Arina Shuraeva; Mikhail Vasenin; Maksim Kuznetsov (2019).
400: 233: 157: 148: 1787: 1311:
Gabber, Eran; Jakobsson, Markus; Matias, Yossi; Mayer, Alain J. (1998).
3967: 3923: 3701: 3348: 3313: 3270: 3165: 3140: 3112: 2881: 2623: 2588: 2333: 2016: 1939: 1690:
tevador/RandomX: Proof of work algorithm based on random code execution
1163: 528: 489: 396: 384: 197: 80: 4363: 4136: 3877: 3872: 3842: 3832: 3791: 3786: 3781: 3761: 3756: 3731: 3726: 3711: 3671: 3323: 3250: 3170: 3155: 3102: 2901: 2835: 2727: 2677: 2658: 2178: 1689: 164: 2420: 1820:"Ban proof of work crypto mining to save energy, EU regulator says" 1759:
Ciaian, Pavel; Kancs, d’Artis; Rajcaniova, Miroslava (2021-10-21).
1711:"Cryptocurrency Value and 51% Attacks: Evidence from Event Studies" 670:
Secure Information Networks: Communications and Multimedia Security
514:
as a power source for two years. Existing mining companies will be
3862: 3751: 3706: 3654: 3611: 3606: 3600: 3353: 3291: 3275: 3235: 3220: 3175: 2886: 2711: 2579: 2328: 2183: 1473: 1332:"Defending against denial-of-service attacks with puzzle auctions" 1130: 458:
Within the Bitcoin community there are groups working together in
415: 258:
There are also fixed-cost functions such as the time-lock puzzle.
182: 922:"Analysis | Bye-Bye, Miners! How Ethereum's Big Change Will Work" 261:
Moreover, the underlying functions used by these schemes may be:
3977: 3972: 3943: 3938: 3902: 2603: 2525: 1624: 1131:"Exponential memory-bound functions for proof of work protocols" 614:"A Cross-Stack Approach Towards Defending Against Cryptojacking" 4218: 3526: 2424: 1912: 103:
A key feature of proof-of-work schemes is their asymmetry: the
3746: 3741: 3594: 3296: 3260: 2861: 1383:. Lecture Notes in Computer Science. Vol. 1318. pp.  863:"Proof of Work Explained in Simple Terms - The Chain Bulletin" 272:, as well as from high-end server to low-end portable devices. 181:
It is verified with a single computation by checking that the
1438:"New client puzzle outsourcing techniques for DoS resistance" 27:
System that regulates the formation of blocks on a blockchain
1164:"Cuckoo Cycle: A Memory Bound Graph-Theoretic Proof-of-Work" 239: 219: 72:
and Ari Juels. The concept was adapted to digital tokens by
1445:
11th ACM Conference on Computer and Communications Security
1908: 268:
where the computation runs at the speed of the processor,
1568: 1540:"Cambridge Bitcoin Electricity Consumption Index (CBECI)" 1539: 1285: 1091:(2003). "On Memory-Bound Functions for Fighting Spam". 4384:
Cryptographically secure pseudorandom number generator
980:
Workshop on the Economics of Information Security 2004
387:, a local search algorithm to solve Boolean problems. 4591: 1504:"Combinatorial Optimization via Proof-of-Useful-Work" 1221:
2009 Annual Computer Security Applications Conference
3514: 1301:
A popular PoW system. First announced in March 1997.
1037:; Burrows, Mike; Manasse, Mark; Wobber, Ted (2005). 4496: 4252: 4165: 4119: 4083: 4037: 3986: 3914: 3891: 3820: 3664: 3625: 3587: 3362: 3336: 3284: 3126: 3088: 3017: 2969: 2900: 2810: 2760: 2736: 2720: 2696: 2657: 2632: 2578: 2568: 2534: 2458: 2362: 2305: 2278: 2242: 2217: 2201: 2192: 2126: 2095: 1974: 1374: 208:There are two classes of proof-of-work protocols. 1569:"Cambridge Bitcoin Electricity Consumption Index" 488:Miners compete to solve crypto challenges on the 302:Here is a list of known proof-of-work functions: 959:"Hashcash - A Denial of Service Counter-Measure" 892:"The Only Crypto Story You Need, by Matt Levine" 709:"Pricing via Processing or Combatting Junk Mail" 1432:Waters, Brent; Juels, Ari; Halderman, John A.; 1313:"Curbing junk e-mail via secure classification" 1075: 1073: 813: 811: 589:On most Unix systems this can be verified with 433:equate Bitcoin's energy consumption to that of 1376:"Auditable metering with lightweight security" 1029: 1027: 973: 971: 319:Ong–Schnorr–Shamir signature broken by Pollard 4230: 3538: 2436: 1924: 1761:"The economic dependency of bitcoin security" 1594:Michael J. Casey; Paul Vigna (16 June 2014). 1330:Wang, Xiao-Feng; Reiter, Michael (May 2003). 326:", a "re-usable proof-of-work" (RPoW) system. 8: 1571:. Cambridge Center For Alternative Finance. 787:"What Is Proof of Work (PoW) in Blockchain?" 695: 693: 691: 689: 666:"Proofs of Work and Bread Pudding Protocols" 659: 657: 200:, which uses a system similar to Hashcash. 4237: 4223: 4215: 3545: 3531: 3523: 3519: 3515: 3497: 3281: 2575: 2443: 2429: 2421: 2198: 1931: 1917: 1909: 1905:for Simplified Payment Verification (SPV). 1339:IEEE Symposium on Security and Privacy '03 1269:: CS1 maint: location missing publisher ( 1214: 1212: 1157: 1155: 1124: 1122: 420:Bitcoin electricity consumption as of 2021 1786: 1776: 1228: 1100: 1039:"Moderately hard, memory-bound functions" 720: 677: 629: 497:European Securities and Markets Authority 192:0000000000000756af69e2ffbdb930261873cd71 1596:"Short-Term Fixes To Avert "51% Attack"" 1171:Financial Cryptography and Data Security 1019:How powerful was the Apollo 11 computer? 464:application-specific integrated circuits 185:hash of the stamp (omit the header name 4598: 2118:List of people in blockchain technology 1848:Sigalos, MacKenzie (23 November 2022). 993:Liu, Debin; Camp, L. Jean (June 2006). 672:. Kluwer Academic Publishers: 258–272. 604: 79:Proof of work was later popularized by 1715:The Journal of Alternative Investments 1575:from the original on 29 September 2020 1262: 1059: 1048: 664:Jakobsson, Markus; Juels, Ari (1999). 503:model due its lower energy emissions. 3415:Decentralized autonomous organization 1520:from the original on 9 September 2022 100:they are the most common mechanisms. 7: 3485: 2405: 1665:"The State of Cryptocurrency Mining" 1625:Overview of the Bitcoin mining pools 1093:Advances in Cryptology - CRYPTO 2003 938:from the original on 2 December 2021 857: 855: 1606:from the original on 15 August 2020 713:Advances in Cryptology — CRYPTO' 92 143:, created by British cryptographer 1671:from the original on 10 March 2020 1223:. Honolulu, HI. pp. 279–288. 920:Kharif, Olga (November 30, 2021). 618:IEEE Computer Architecture Letters 594::::9B760005E92F0DAE | openssl sha1 495:In January 2022 Vice-Chair of the 152:attempting to send bulk messages. 25: 3425:Distributed ledger technology law 1887: (archived December 22, 2007) 1478:Cryptology ePrint Archive, Report 1135:Cryptology ePrint Archive, Report 837:from the original on 27 June 2023 819:"Cryptocurrencies and blockchain" 64:and other service abuses such as 4625: 4613: 4601: 4572: 4571: 3496: 3484: 3473: 3472: 2404: 2395: 2394: 1903:Merkle Proof Standardised Format 758:"RPOW - Reusable Proofs of Work" 289:Finally, some PoW systems offer 251:is lower than the variance of a 1860:from the original on 2022-12-03 1830:from the original on 2022-04-19 1741:from the original on 2021-02-06 1550:from the original on 2020-03-02 1484:from the original on 2016-08-26 1454:from the original on 2021-04-21 1292:from the original on 2017-09-29 1198:from the original on 2017-07-05 1141:from the original on 2018-04-09 1001:from the original on 2017-08-20 902:from the original on 2023-04-07 873:from the original on 2023-04-01 797:from the original on 2024-01-17 768:from the original on 2023-06-19 739:from the original on 2017-11-26 484:Environmental impact of bitcoin 298:List of proof-of-work functions 119:in the form of cryptocurrency. 4433:Information-theoretic security 4142:NIST hash function competition 2270:2020 Twitter account hijacking 506:In November 2022 the state of 1: 4608:Free and open-source software 2113:List of bitcoin organizations 1778:10.1080/00036846.2021.1931003 1663:Vorick, David (13 May 2018). 122:The purpose of proof-of-work 4147:Password Hashing Competition 3558:message authentication codes 3554:Cryptographic hash functions 2287:The Rise and Rise of Bitcoin 1407:Updated version May 4, 1998. 1102:10.1007/978-3-540-45146-4_25 679:10.1007/978-0-387-35568-9_18 574:Consensus (computer science) 270:which greatly varies in time 126:is not proving that certain 92:) remain the two best known 4549:Message authentication code 4504:Cryptographic hash function 4317:Cryptographic hash function 4101:Merkle–DamgĂĄrd construction 2481:Cryptographic hash function 2250:Bitcoin scalability problem 1818:Bateman, Tom (2022-01-19). 1511:IACR conference Crypto 2022 1179:10.1007/978-3-662-48051-9_4 381:optimization problem solver 366:Proof of useful work (PoUW) 360:Guided tour puzzle protocol 94:Sybil deterrence mechanisms 4674: 4428:Harvest now, decrypt later 957:Back, Adam (August 2002). 481: 474:against a cryptocurrency. 391:Bitcoin-type proof of work 307:Integer square root modulo 60:in 1993 as a way to deter 4567: 4544:Post-quantum cryptography 4214: 3564: 3522: 3518: 3468: 3445:Initial exchange offering 3420:Decentralized application 3400:Cryptocurrency in Nigeria 2390: 2265:2018 Bitcoin bomb threats 2260:2018 cryptocurrency crash 2103:List of bitcoin companies 1946: 62:denial-of-service attacks 4534:Quantum key distribution 4524:Authenticated encryption 4379:Random number generation 3895:key derivation functions 3450:List of cryptocurrencies 3337:Crypto service companies 3128:Cryptocurrency exchanges 1393:10.1007/3-540-63594-7_75 722:10.1007/3-540-48071-4_10 631:10.1109/LCA.2020.3017457 249:rectangular distribution 175:X-Hashcash: 1:52:380119: 48:) proves to others (the 44:in which one party (the 4529:Public-key cryptography 4519:Symmetric-key algorithm 4322:Key derivation function 4282:Cryptographic primitive 4275:Authentication protocol 4265:Outline of cryptography 4260:History of cryptography 4173:Hash-based cryptography 4075:Length extension attack 1602:. Wall Street Journal. 1472:Coelho, Fabien (2007). 1129:Coelho, Fabien (2005). 431:University of Cambridge 4270:Cryptographic protocol 4183:Message authentication 3385:Complementary currency 2486:Decentralized exchange 2471:Cryptocurrency tumbler 2364:Bitcoin in El Salvador 1727:10.3905/jai.2019.1.081 1381:Financial Cryptography 1317:Financial Cryptography 1058:Cite journal requires 478:Environmental concerns 454:ASICs and mining pools 421: 408:around a target time. 324:bread pudding protocol 244: 224: 4423:End-to-end encryption 4369:Cryptojacking malware 3440:Initial coin offering 3395:Cryptocurrency bubble 2921:Basic Attention Token 2491:Decentralized finance 2476:Cryptocurrency wallet 2149:Cryptocurrency wallet 2108:List of bitcoin forks 1966:Environmental effects 1644:What is an ASIC miner 1239:10.1109/ACSAC.2009.33 762:nakamotoinstitute.org 569:Proof of elapsed time 419: 243: 229:Solution–verification 223: 172:on January 19, 2038: 4539:Quantum cryptography 4463:Trusted timestamping 3435:Environmental impact 3405:Cryptocurrency scams 1987:Andreas Antonopoulos 1653:on digitaltrends.com 1367:Franklin, Matthew K. 1162:Tromp, John (2015). 591:echo -n 1:52:380119: 441:History modification 253:Poisson distribution 178::::9B760005E92F0DAE 96:. In the context of 83:as a foundation for 4302:Cryptographic nonce 4070:Side-channel attack 3090:Inactive currencies 927:The Washington Post 827:European Parliament 554:Proof of personhood 376:consensus mechanism 160:would be reduced. 4658:Energy consumption 4408:Subliminal channel 4392:Pseudorandom noise 4339:Key (cryptography) 4127:CAESAR Competition 4111:HAIFA construction 4060:Brute-force attack 2545:Proof of authority 2516:Non-fungible token 2496:Distributed ledger 2317:Bitcoin Foundation 2255:History of bitcoin 2062:Cameron Winklevoss 1695:2021-09-01 at the 1649:2018-05-22 at the 1634:on blockchain.info 1630:2020-04-21 at the 544:Proof of authority 490:Bitcoin blockchain 462:. Some miners use 422: 412:Energy consumption 245: 225: 213:Challenge–response 4589: 4588: 4585: 4584: 4468:Key-based routing 4458:Trapdoor function 4329:Digital signature 4210: 4209: 4206: 4205: 4004:ChaCha20-Poly1305 3821:Password hashing/ 3512: 3511: 3332: 3331: 2989:First Digital USD 2806: 2805: 2506:Lightning Network 2418: 2417: 2310: 2238: 2237: 2209:Bitcoin Unlimited 2164:Lightning Network 1771:(49): 5738–5755. 1765:Applied Economics 1502:Fitzi, Matthias. 1434:Felten, Edward W. 1402:978-3-540-63594-9 1248:978-1-4244-5327-6 1188:978-3-662-48050-2 1112:978-3-540-40674-7 867:chainbulletin.com 732:978-3-540-57340-1 16:(Redirected from 4665: 4653:Cryptocurrencies 4630: 4629: 4628: 4618: 4617: 4606: 4605: 4604: 4597: 4575: 4574: 4403:Insecure channel 4239: 4232: 4225: 4216: 4091:Avalanche effect 4045:Collision attack 3588:Common functions 3547: 3540: 3533: 3524: 3520: 3516: 3500: 3499: 3488: 3487: 3476: 3475: 3460:Virtual currency 3410:Digital currency 3390:Crypto-anarchism 3282: 3035:HBAR (Hashgraph) 3018:Other currencies 2649:Ethereum Classic 2576: 2452:Cryptocurrencies 2445: 2438: 2431: 2422: 2408: 2407: 2398: 2397: 2323:Bitcoin Magazine 2308: 2199: 2067:Tyler Winklevoss 2027:Satoshi Nakamoto 1933: 1926: 1919: 1910: 1869: 1868: 1866: 1865: 1845: 1839: 1838: 1836: 1835: 1815: 1809: 1808: 1790: 1780: 1756: 1750: 1749: 1747: 1746: 1706: 1700: 1687: 1681: 1680: 1678: 1676: 1660: 1654: 1641: 1635: 1622: 1616: 1615: 1613: 1611: 1591: 1585: 1584: 1582: 1580: 1565: 1559: 1558: 1556: 1555: 1536: 1530: 1529: 1527: 1525: 1519: 1508: 1499: 1493: 1492: 1490: 1489: 1469: 1463: 1462: 1460: 1459: 1453: 1442: 1429: 1423: 1422: 1414: 1408: 1406: 1378: 1363: 1357: 1356: 1354: 1353: 1347: 1341:. Archived from 1336: 1327: 1321: 1320: 1308: 1302: 1300: 1298: 1297: 1281: 1275: 1274: 1268: 1260: 1232: 1216: 1207: 1206: 1204: 1203: 1197: 1168: 1159: 1150: 1149: 1147: 1146: 1126: 1117: 1116: 1104: 1085:Goldberg, Andrew 1077: 1068: 1067: 1061: 1056: 1054: 1046: 1031: 1022: 1016: 1010: 1009: 1007: 1006: 990: 984: 983: 975: 966: 965: 963: 954: 948: 947: 945: 943: 917: 911: 910: 908: 907: 888: 882: 881: 879: 878: 859: 850: 849: 844: 842: 836: 823: 815: 806: 805: 803: 802: 783: 777: 776: 774: 773: 754: 748: 747: 745: 744: 724: 697: 684: 683: 681: 661: 652: 651: 633: 609: 595: 588: 512:renewable energy 188: 171: 98:cryptocurrencies 70:Markus Jakobsson 21: 4673: 4672: 4668: 4667: 4666: 4664: 4663: 4662: 4638: 4637: 4636: 4626: 4624: 4612: 4602: 4600: 4592: 4590: 4581: 4563: 4492: 4248: 4243: 4202: 4161: 4120:Standardization 4115: 4106:Sponge function 4079: 4055:Birthday attack 4050:Preimage attack 4033: 3989: 3982: 3910: 3893: 3892:General purpose 3887: 3822: 3816: 3665:Other functions 3660: 3627:SHA-3 finalists 3621: 3583: 3560: 3551: 3513: 3508: 3464: 3430:Double-spending 3380:Blockchain game 3358: 3328: 3280: 3122: 3084: 3013: 2965: 2896: 2802: 2756: 2732: 2716: 2692: 2653: 2628: 2564: 2530: 2454: 2449: 2419: 2414: 2386: 2358: 2339:Canaan Creative 2309:(not exchanges) 2307: 2301: 2274: 2234: 2213: 2188: 2134:Bitcoin network 2122: 2091: 2042:Vitalik Buterin 1992:Brian Armstrong 1970: 1942: 1937: 1885:Wayback Machine 1881:Finney's system 1877: 1872: 1863: 1861: 1847: 1846: 1842: 1833: 1831: 1817: 1816: 1812: 1758: 1757: 1753: 1744: 1742: 1708: 1707: 1703: 1697:Wayback Machine 1688: 1684: 1674: 1672: 1662: 1661: 1657: 1651:Wayback Machine 1642: 1638: 1632:Wayback Machine 1623: 1619: 1609: 1607: 1593: 1592: 1588: 1578: 1576: 1567: 1566: 1562: 1553: 1551: 1538: 1537: 1533: 1523: 1521: 1517: 1506: 1501: 1500: 1496: 1487: 1485: 1471: 1470: 1466: 1457: 1455: 1451: 1440: 1431: 1430: 1426: 1416: 1415: 1411: 1403: 1365: 1364: 1360: 1351: 1349: 1345: 1334: 1329: 1328: 1324: 1310: 1309: 1305: 1295: 1293: 1283: 1282: 1278: 1261: 1249: 1230:10.1.1.597.6304 1218: 1217: 1210: 1201: 1199: 1195: 1189: 1166: 1161: 1160: 1153: 1144: 1142: 1128: 1127: 1120: 1113: 1079: 1078: 1071: 1057: 1047: 1033: 1032: 1025: 1017: 1013: 1004: 1002: 992: 991: 987: 977: 976: 969: 961: 956: 955: 951: 941: 939: 919: 918: 914: 905: 903: 890: 889: 885: 876: 874: 861: 860: 853: 840: 838: 834: 821: 817: 816: 809: 800: 798: 785: 784: 780: 771: 769: 756: 755: 751: 742: 740: 733: 699: 698: 687: 663: 662: 655: 611: 610: 606: 602: 590: 585: 582: 525: 486: 480: 456: 443: 414: 393: 368: 300: 206: 193: 186: 179: 168: 137: 37:) is a form of 28: 23: 22: 15: 12: 11: 5: 4671: 4669: 4661: 4660: 4655: 4650: 4640: 4639: 4635: 4634: 4622: 4610: 4587: 4586: 4583: 4582: 4580: 4579: 4568: 4565: 4564: 4562: 4561: 4556: 4554:Random numbers 4551: 4546: 4541: 4536: 4531: 4526: 4521: 4516: 4511: 4506: 4500: 4498: 4494: 4493: 4491: 4490: 4485: 4480: 4478:Garlic routing 4475: 4470: 4465: 4460: 4455: 4450: 4445: 4440: 4435: 4430: 4425: 4420: 4415: 4410: 4405: 4400: 4398:Secure channel 4395: 4389: 4388: 4387: 4376: 4371: 4366: 4361: 4359:Key stretching 4356: 4351: 4346: 4341: 4336: 4331: 4326: 4325: 4324: 4319: 4309: 4307:Cryptovirology 4304: 4299: 4294: 4292:Cryptocurrency 4289: 4284: 4279: 4278: 4277: 4267: 4262: 4256: 4254: 4250: 4249: 4244: 4242: 4241: 4234: 4227: 4219: 4212: 4211: 4208: 4207: 4204: 4203: 4201: 4200: 4195: 4190: 4185: 4180: 4175: 4169: 4167: 4163: 4162: 4160: 4159: 4154: 4149: 4144: 4139: 4134: 4129: 4123: 4121: 4117: 4116: 4114: 4113: 4108: 4103: 4098: 4096:Hash collision 4093: 4087: 4085: 4081: 4080: 4078: 4077: 4072: 4067: 4062: 4057: 4052: 4047: 4041: 4039: 4035: 4034: 4032: 4031: 4026: 4021: 4016: 4011: 4006: 4001: 3995: 3993: 3984: 3983: 3981: 3980: 3975: 3970: 3965: 3960: 3955: 3946: 3941: 3936: 3931: 3926: 3920: 3918: 3912: 3911: 3909: 3908: 3905: 3899: 3897: 3889: 3888: 3886: 3885: 3880: 3875: 3870: 3865: 3860: 3855: 3850: 3845: 3840: 3835: 3829: 3827: 3824:key stretching 3818: 3817: 3815: 3814: 3809: 3804: 3799: 3794: 3789: 3784: 3779: 3774: 3769: 3764: 3759: 3754: 3749: 3744: 3739: 3734: 3729: 3724: 3719: 3714: 3709: 3704: 3699: 3694: 3689: 3684: 3679: 3674: 3668: 3666: 3662: 3661: 3659: 3658: 3652: 3647: 3642: 3637: 3631: 3629: 3623: 3622: 3620: 3619: 3614: 3609: 3604: 3598: 3591: 3589: 3585: 3584: 3582: 3581: 3576: 3571: 3565: 3562: 3561: 3552: 3550: 3549: 3542: 3535: 3527: 3510: 3509: 3507: 3506: 3494: 3482: 3469: 3466: 3465: 3463: 3462: 3457: 3452: 3447: 3442: 3437: 3432: 3427: 3422: 3417: 3412: 3407: 3402: 3397: 3392: 3387: 3382: 3377: 3372: 3366: 3364: 3363:Related topics 3360: 3359: 3357: 3356: 3351: 3346: 3340: 3338: 3334: 3333: 3330: 3329: 3327: 3326: 3321: 3316: 3311: 3306: 3305: 3304: 3294: 3288: 3286: 3279: 3278: 3273: 3268: 3263: 3258: 3253: 3248: 3243: 3238: 3233: 3228: 3223: 3218: 3213: 3208: 3203: 3198: 3193: 3188: 3183: 3178: 3173: 3168: 3163: 3158: 3153: 3148: 3143: 3138: 3132: 3130: 3124: 3123: 3121: 3120: 3115: 3110: 3105: 3100: 3094: 3092: 3086: 3085: 3083: 3082: 3077: 3072: 3067: 3062: 3057: 3052: 3047: 3042: 3037: 3032: 3027: 3021: 3019: 3015: 3014: 3012: 3011: 3006: 3001: 2996: 2991: 2986: 2981: 2975: 2973: 2967: 2966: 2964: 2963: 2958: 2953: 2948: 2943: 2938: 2933: 2928: 2923: 2918: 2913: 2907: 2905: 2898: 2897: 2895: 2894: 2889: 2884: 2879: 2874: 2869: 2864: 2859: 2854: 2849: 2844: 2838: 2833: 2828: 2823: 2817: 2815: 2812:Proof of stake 2808: 2807: 2804: 2803: 2801: 2800: 2795: 2790: 2785: 2783:Nervos Network 2780: 2775: 2770: 2764: 2762: 2758: 2757: 2755: 2754: 2749: 2743: 2741: 2734: 2733: 2731: 2730: 2724: 2722: 2718: 2717: 2715: 2714: 2709: 2703: 2701: 2694: 2693: 2691: 2690: 2685: 2680: 2675: 2670: 2664: 2662: 2655: 2654: 2652: 2651: 2646: 2639: 2637: 2630: 2629: 2627: 2626: 2621: 2616: 2611: 2606: 2601: 2596: 2591: 2585: 2583: 2573: 2566: 2565: 2563: 2562: 2557: 2555:Proof of stake 2552: 2550:Proof of space 2547: 2541: 2539: 2532: 2531: 2529: 2528: 2523: 2521:Smart contract 2518: 2513: 2508: 2503: 2498: 2493: 2488: 2483: 2478: 2473: 2468: 2462: 2460: 2456: 2455: 2450: 2448: 2447: 2440: 2433: 2425: 2416: 2415: 2413: 2412: 2402: 2391: 2388: 2387: 2385: 2384: 2379: 2374: 2368: 2366: 2360: 2359: 2357: 2356: 2351: 2346: 2341: 2336: 2331: 2326: 2319: 2313: 2311: 2306:Legal entities 2303: 2302: 2300: 2299: 2291: 2282: 2280: 2276: 2275: 2273: 2272: 2267: 2262: 2257: 2252: 2246: 2244: 2240: 2239: 2236: 2235: 2233: 2232: 2227: 2221: 2219: 2215: 2214: 2212: 2211: 2205: 2203: 2196: 2190: 2189: 2187: 2186: 2181: 2176: 2171: 2166: 2161: 2156: 2151: 2146: 2144:Cryptocurrency 2141: 2136: 2130: 2128: 2124: 2123: 2121: 2120: 2115: 2110: 2105: 2099: 2097: 2093: 2092: 2090: 2089: 2084: 2079: 2074: 2069: 2064: 2059: 2054: 2049: 2044: 2039: 2034: 2029: 2024: 2019: 2014: 2009: 2004: 2002:Wences Casares 1999: 1994: 1989: 1984: 1982:Gavin Andresen 1978: 1976: 1972: 1971: 1969: 1968: 1963: 1958: 1953: 1947: 1944: 1943: 1938: 1936: 1935: 1928: 1921: 1913: 1907: 1906: 1900: 1888: 1876: 1875:External links 1873: 1871: 1870: 1840: 1810: 1751: 1701: 1682: 1655: 1636: 1617: 1586: 1560: 1531: 1494: 1464: 1424: 1409: 1401: 1371:Malkhi, Dahlia 1358: 1322: 1303: 1276: 1247: 1208: 1187: 1151: 1118: 1111: 1081:Dwork, Cynthia 1069: 1060:|journal= 1023: 1011: 985: 967: 949: 932:Bloomberg News 912: 883: 851: 807: 778: 749: 731: 701:Dwork, Cynthia 685: 653: 624:(2): 126–129. 603: 601: 598: 597: 596: 581: 578: 577: 576: 571: 566: 564:Proof of stake 561: 559:Proof of space 556: 551: 546: 541: 539:Cryptocurrency 536: 531: 524: 521: 501:proof of stake 479: 476: 455: 452: 442: 439: 413: 410: 392: 389: 367: 364: 363: 362: 357: 351: 348: 345: 342: 339: 336:Diffie-Hellman 333: 330: 329:Hash sequences 327: 320: 317: 310: 299: 296: 287: 286: 279: 273: 238: 237: 218: 217: 205: 202: 191: 174: 136: 133: 90:proof of stake 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 4670: 4659: 4656: 4654: 4651: 4649: 4646: 4645: 4643: 4633: 4623: 4621: 4616: 4611: 4609: 4599: 4595: 4578: 4570: 4569: 4566: 4560: 4559:Steganography 4557: 4555: 4552: 4550: 4547: 4545: 4542: 4540: 4537: 4535: 4532: 4530: 4527: 4525: 4522: 4520: 4517: 4515: 4514:Stream cipher 4512: 4510: 4507: 4505: 4502: 4501: 4499: 4495: 4489: 4486: 4484: 4481: 4479: 4476: 4474: 4473:Onion routing 4471: 4469: 4466: 4464: 4461: 4459: 4456: 4454: 4453:Shared secret 4451: 4449: 4446: 4444: 4441: 4439: 4436: 4434: 4431: 4429: 4426: 4424: 4421: 4419: 4416: 4414: 4411: 4409: 4406: 4404: 4401: 4399: 4396: 4393: 4390: 4385: 4382: 4381: 4380: 4377: 4375: 4372: 4370: 4367: 4365: 4362: 4360: 4357: 4355: 4352: 4350: 4349:Key generator 4347: 4345: 4342: 4340: 4337: 4335: 4332: 4330: 4327: 4323: 4320: 4318: 4315: 4314: 4313: 4312:Hash function 4310: 4308: 4305: 4303: 4300: 4298: 4295: 4293: 4290: 4288: 4287:Cryptanalysis 4285: 4283: 4280: 4276: 4273: 4272: 4271: 4268: 4266: 4263: 4261: 4258: 4257: 4255: 4251: 4247: 4240: 4235: 4233: 4228: 4226: 4221: 4220: 4217: 4213: 4199: 4196: 4194: 4191: 4189: 4188:Proof of work 4186: 4184: 4181: 4179: 4176: 4174: 4171: 4170: 4168: 4164: 4158: 4155: 4153: 4150: 4148: 4145: 4143: 4140: 4138: 4135: 4133: 4130: 4128: 4125: 4124: 4122: 4118: 4112: 4109: 4107: 4104: 4102: 4099: 4097: 4094: 4092: 4089: 4088: 4086: 4082: 4076: 4073: 4071: 4068: 4066: 4065:Rainbow table 4063: 4061: 4058: 4056: 4053: 4051: 4048: 4046: 4043: 4042: 4040: 4036: 4030: 4027: 4025: 4022: 4020: 4017: 4015: 4012: 4010: 4007: 4005: 4002: 4000: 3997: 3996: 3994: 3991: 3988:Authenticated 3985: 3979: 3976: 3974: 3971: 3969: 3966: 3964: 3961: 3959: 3956: 3954: 3950: 3947: 3945: 3942: 3940: 3937: 3935: 3932: 3930: 3927: 3925: 3922: 3921: 3919: 3917: 3916:MAC functions 3913: 3906: 3904: 3901: 3900: 3898: 3896: 3890: 3884: 3881: 3879: 3876: 3874: 3871: 3869: 3866: 3864: 3861: 3859: 3856: 3854: 3851: 3849: 3846: 3844: 3841: 3839: 3836: 3834: 3831: 3830: 3828: 3825: 3819: 3813: 3810: 3808: 3805: 3803: 3800: 3798: 3795: 3793: 3790: 3788: 3785: 3783: 3780: 3778: 3775: 3773: 3770: 3768: 3765: 3763: 3760: 3758: 3755: 3753: 3750: 3748: 3745: 3743: 3740: 3738: 3735: 3733: 3730: 3728: 3725: 3723: 3720: 3718: 3715: 3713: 3710: 3708: 3705: 3703: 3700: 3698: 3695: 3693: 3690: 3688: 3685: 3683: 3680: 3678: 3675: 3673: 3670: 3669: 3667: 3663: 3656: 3653: 3651: 3648: 3646: 3643: 3641: 3638: 3636: 3633: 3632: 3630: 3628: 3624: 3618: 3615: 3613: 3610: 3608: 3605: 3603:(compromised) 3602: 3599: 3597:(compromised) 3596: 3593: 3592: 3590: 3586: 3580: 3579:Known attacks 3577: 3575: 3572: 3570: 3567: 3566: 3563: 3559: 3555: 3548: 3543: 3541: 3536: 3534: 3529: 3528: 3525: 3521: 3517: 3505: 3504: 3495: 3493: 3492: 3483: 3481: 3480: 3471: 3470: 3467: 3461: 3458: 3456: 3453: 3451: 3448: 3446: 3443: 3441: 3438: 3436: 3433: 3431: 3428: 3426: 3423: 3421: 3418: 3416: 3413: 3411: 3408: 3406: 3403: 3401: 3398: 3396: 3393: 3391: 3388: 3386: 3383: 3381: 3378: 3376: 3373: 3371: 3368: 3367: 3365: 3361: 3355: 3352: 3350: 3347: 3345: 3342: 3341: 3339: 3335: 3325: 3322: 3320: 3317: 3315: 3312: 3310: 3309:LocalBitcoins 3307: 3303: 3300: 3299: 3298: 3295: 3293: 3290: 3289: 3287: 3283: 3277: 3274: 3272: 3269: 3267: 3264: 3262: 3259: 3257: 3254: 3252: 3249: 3247: 3244: 3242: 3241:ItBit (Paxos) 3239: 3237: 3234: 3232: 3229: 3227: 3224: 3222: 3219: 3217: 3214: 3212: 3209: 3207: 3204: 3202: 3199: 3197: 3194: 3192: 3189: 3187: 3184: 3182: 3179: 3177: 3174: 3172: 3169: 3167: 3164: 3162: 3159: 3157: 3154: 3152: 3149: 3147: 3144: 3142: 3139: 3137: 3134: 3133: 3131: 3129: 3125: 3119: 3116: 3114: 3111: 3109: 3106: 3104: 3101: 3099: 3096: 3095: 3093: 3091: 3087: 3081: 3078: 3076: 3073: 3071: 3068: 3066: 3063: 3061: 3058: 3056: 3053: 3051: 3048: 3046: 3043: 3041: 3038: 3036: 3033: 3031: 3028: 3026: 3023: 3022: 3020: 3016: 3010: 3007: 3005: 3002: 3000: 2997: 2995: 2992: 2990: 2987: 2985: 2982: 2980: 2977: 2976: 2974: 2972: 2968: 2962: 2959: 2957: 2954: 2952: 2949: 2947: 2944: 2942: 2939: 2937: 2934: 2932: 2929: 2927: 2924: 2922: 2919: 2917: 2914: 2912: 2909: 2908: 2906: 2903: 2899: 2893: 2890: 2888: 2885: 2883: 2880: 2878: 2875: 2873: 2870: 2868: 2865: 2863: 2860: 2858: 2855: 2853: 2850: 2848: 2845: 2842: 2839: 2837: 2834: 2832: 2829: 2827: 2824: 2822: 2819: 2818: 2816: 2813: 2809: 2799: 2796: 2794: 2791: 2789: 2786: 2784: 2781: 2779: 2776: 2774: 2771: 2769: 2766: 2765: 2763: 2759: 2753: 2750: 2748: 2745: 2744: 2742: 2739: 2735: 2729: 2726: 2725: 2723: 2721:RandomX-based 2719: 2713: 2710: 2708: 2705: 2704: 2702: 2699: 2695: 2689: 2686: 2684: 2681: 2679: 2676: 2674: 2671: 2669: 2666: 2665: 2663: 2660: 2656: 2650: 2647: 2644: 2641: 2640: 2638: 2635: 2631: 2625: 2622: 2620: 2617: 2615: 2612: 2610: 2607: 2605: 2602: 2600: 2597: 2595: 2592: 2590: 2587: 2586: 2584: 2581: 2577: 2574: 2571: 2570:Proof of work 2567: 2561: 2560:Proof of work 2558: 2556: 2553: 2551: 2548: 2546: 2543: 2542: 2540: 2537: 2533: 2527: 2524: 2522: 2519: 2517: 2514: 2512: 2509: 2507: 2504: 2502: 2499: 2497: 2494: 2492: 2489: 2487: 2484: 2482: 2479: 2477: 2474: 2472: 2469: 2467: 2464: 2463: 2461: 2457: 2453: 2446: 2441: 2439: 2434: 2432: 2427: 2426: 2423: 2411: 2403: 2401: 2393: 2392: 2389: 2383: 2380: 2378: 2377:Bitcoin Beach 2375: 2373: 2370: 2369: 2367: 2365: 2361: 2355: 2352: 2350: 2347: 2345: 2342: 2340: 2337: 2335: 2332: 2330: 2327: 2325: 2324: 2320: 2318: 2315: 2314: 2312: 2304: 2297: 2296: 2292: 2289: 2288: 2284: 2283: 2281: 2277: 2271: 2268: 2266: 2263: 2261: 2258: 2256: 2253: 2251: 2248: 2247: 2245: 2241: 2231: 2228: 2226: 2223: 2222: 2220: 2216: 2210: 2207: 2206: 2204: 2200: 2197: 2195: 2191: 2185: 2182: 2180: 2177: 2175: 2174:Proof of work 2172: 2170: 2167: 2165: 2162: 2160: 2157: 2155: 2152: 2150: 2147: 2145: 2142: 2140: 2137: 2135: 2132: 2131: 2129: 2125: 2119: 2116: 2114: 2111: 2109: 2106: 2104: 2101: 2100: 2098: 2094: 2088: 2087:Erik Voorhees 2085: 2083: 2080: 2078: 2075: 2073: 2070: 2068: 2065: 2063: 2060: 2058: 2055: 2053: 2050: 2048: 2047:Ross Ulbricht 2045: 2043: 2040: 2038: 2035: 2033: 2032:Charlie Shrem 2030: 2028: 2025: 2023: 2022:Mark Karpelès 2020: 2018: 2015: 2013: 2010: 2008: 2005: 2003: 2000: 1998: 1995: 1993: 1990: 1988: 1985: 1983: 1980: 1979: 1977: 1973: 1967: 1964: 1962: 1959: 1957: 1954: 1952: 1949: 1948: 1945: 1941: 1934: 1929: 1927: 1922: 1920: 1915: 1914: 1911: 1904: 1901: 1899: 1895: 1892: 1889: 1886: 1882: 1879: 1878: 1874: 1859: 1855: 1851: 1844: 1841: 1829: 1825: 1821: 1814: 1811: 1806: 1802: 1798: 1794: 1789: 1784: 1779: 1774: 1770: 1766: 1762: 1755: 1752: 1740: 1736: 1732: 1728: 1724: 1720: 1716: 1712: 1705: 1702: 1698: 1694: 1691: 1686: 1683: 1670: 1666: 1659: 1656: 1652: 1648: 1645: 1640: 1637: 1633: 1629: 1626: 1621: 1618: 1605: 1601: 1597: 1590: 1587: 1574: 1570: 1564: 1561: 1549: 1545: 1544:www.cbeci.org 1541: 1535: 1532: 1516: 1512: 1505: 1498: 1495: 1483: 1479: 1475: 1468: 1465: 1450: 1446: 1439: 1435: 1428: 1425: 1420: 1413: 1410: 1404: 1398: 1394: 1390: 1386: 1382: 1377: 1372: 1368: 1362: 1359: 1348:on 2016-03-03 1344: 1340: 1333: 1326: 1323: 1318: 1314: 1307: 1304: 1291: 1287: 1280: 1277: 1272: 1266: 1258: 1254: 1250: 1244: 1240: 1236: 1231: 1226: 1222: 1215: 1213: 1209: 1194: 1190: 1184: 1180: 1176: 1172: 1165: 1158: 1156: 1152: 1140: 1136: 1132: 1125: 1123: 1119: 1114: 1108: 1103: 1098: 1094: 1090: 1086: 1082: 1076: 1074: 1070: 1065: 1052: 1045:(2): 299–327. 1044: 1040: 1036: 1035:Abadi, MartĂ­n 1030: 1028: 1024: 1020: 1015: 1012: 1000: 996: 989: 986: 981: 974: 972: 968: 960: 953: 950: 937: 933: 929: 928: 923: 916: 913: 901: 897: 896:Bloomberg.com 893: 887: 884: 872: 868: 864: 858: 856: 852: 848: 833: 830:. July 2018. 829: 828: 820: 814: 812: 808: 796: 792: 788: 782: 779: 767: 763: 759: 753: 750: 738: 734: 728: 723: 718: 714: 710: 706: 702: 696: 694: 692: 690: 686: 680: 675: 671: 667: 660: 658: 654: 649: 645: 641: 637: 632: 627: 623: 619: 615: 608: 605: 599: 593: 587: 584: 583: 579: 575: 572: 570: 567: 565: 562: 560: 557: 555: 552: 550: 549:Proof of burn 547: 545: 542: 540: 537: 535: 532: 530: 527: 526: 522: 520: 517: 516:grandfathered 513: 509: 504: 502: 498: 493: 491: 485: 477: 475: 473: 467: 465: 461: 453: 451: 449: 440: 438: 436: 432: 427: 418: 411: 409: 407: 402: 398: 395:In 2009, the 390: 388: 386: 382: 377: 373: 365: 361: 358: 355: 352: 349: 346: 343: 340: 338:–based puzzle 337: 334: 331: 328: 325: 321: 318: 315: 311: 309:a large prime 308: 305: 304: 303: 297: 295: 292: 283: 282:Network-bound 280: 277: 274: 271: 267: 264: 263: 262: 259: 256: 254: 250: 242: 235: 230: 227: 226: 222: 214: 211: 210: 209: 203: 201: 199: 190: 184: 177: 173: 170: 166: 161: 159: 153: 150: 146: 142: 134: 132: 129: 125: 120: 118: 114: 110: 109:client puzzle 106: 101: 99: 95: 91: 86: 82: 77: 75: 71: 67: 63: 59: 58:Cynthia Dwork 55: 51: 47: 43: 40: 39:cryptographic 36: 32: 31:Proof of work 19: 18:Proof-of-work 4648:Cryptography 4509:Block cipher 4354:Key schedule 4344:Key exchange 4334:Kleptography 4297:Cryptosystem 4246:Cryptography 4187: 3501: 3489: 3477: 3354:Initiative Q 2707:Bitcoin Gold 2599:Counterparty 2594:Bitcoin Cash 2569: 2559: 2382:Bitcoin City 2321: 2293: 2285: 2230:Bitcoin Gold 2225:Bitcoin Cash 2173: 2127:Technologies 2077:Dave Kleiman 2072:Craig Wright 1961:Legal status 1897: 1862:. Retrieved 1853: 1843: 1832:. Retrieved 1823: 1813: 1788:10419/251105 1768: 1764: 1754: 1743:. Retrieved 1721:(3): 65–77. 1718: 1714: 1704: 1685: 1673:. Retrieved 1658: 1639: 1620: 1608:. Retrieved 1599: 1589: 1579:30 September 1577:. Retrieved 1563: 1552:. Retrieved 1543: 1534: 1522:. Retrieved 1510: 1497: 1486:. Retrieved 1477: 1467: 1456:. Retrieved 1444: 1427: 1418: 1412: 1380: 1361: 1350:. Retrieved 1343:the original 1338: 1325: 1316: 1306: 1294:. Retrieved 1284:Back, Adam. 1279: 1220: 1200:. Retrieved 1170: 1143:. Retrieved 1134: 1092: 1051:cite journal 1042: 1014: 1003:. Retrieved 988: 979: 952: 940:. Retrieved 925: 915: 904:. Retrieved 895: 886: 875:. Retrieved 866: 846: 839:. Retrieved 825: 799:. Retrieved 791:Investopedia 790: 781: 770:. Retrieved 761: 752: 741:. Retrieved 712: 669: 621: 617: 607: 586: 505: 494: 487: 468: 460:mining pools 457: 444: 426:Peer-to-peer 423: 394: 369: 350:Cuckoo Cycle 301: 290: 288: 281: 276:Memory-bound 275: 265: 260: 257: 246: 228: 212: 207: 194: 180: 162: 154: 140: 138: 121: 104: 102: 78: 49: 45: 34: 30: 29: 4632:Numismatics 4497:Mathematics 4488:Mix network 4178:Merkle tree 4166:Utilization 4152:NSA Suite B 3455:Token money 3344:Hyperledger 3216:EDX Markets 3080:WhopperCoin 2971:Stablecoins 2372:Bitcoin Law 2298:(2015 film) 2290:(2014 film) 2154:Bitcoin ATM 2057:Cody Wilson 1524:9 September 435:Switzerland 354:Merkle tree 314:Fiat–Shamir 187:X-Hashcash: 4642:Categories 4448:Ciphertext 4418:Decryption 4413:Encryption 4374:Ransomware 3990:encryption 3767:RadioGatĂşn 3574:Comparison 3375:BitLicense 3319:QuadrigaCX 3302:bankruptcy 3266:ShapeShift 3211:Crypto.com 3098:BitConnect 3050:MobileCoin 2814:currencies 2673:Bitconnect 2668:Auroracoin 2572:currencies 2538:mechanisms 2466:Blockchain 2459:Technology 2139:Blockchain 2037:Nick Szabo 2012:Hal Finney 2007:Tim Draper 1864:2022-12-04 1834:2022-01-22 1745:2020-10-28 1675:28 October 1600:Money Beat 1554:2020-02-20 1488:2007-11-25 1458:2019-08-06 1352:2013-04-15 1296:2005-03-02 1286:"HashCash" 1202:2015-09-30 1145:2007-11-04 1089:Naor, Moni 1005:2015-12-29 942:13 January 906:2023-04-01 877:2023-04-01 841:29 October 801:2024-01-17 772:2024-01-17 743:2012-09-10 705:Naor, Moni 600:References 534:Bitmessage 482:See also: 472:51% attack 448:51% attack 406:block time 316:signatures 135:Background 124:algorithms 74:Hal Finney 4438:Plaintext 3907:KDF1/KDF2 3826:functions 3812:Whirlpool 3206:Coincheck 3108:KodakCoin 2951:Shiba Inu 2936:KodakCoin 2926:Chainlink 2852:Injective 2826:Avalanche 2788:Primecoin 2536:Consensus 2052:Roger Ver 1997:Adam Back 1956:Economics 1805:231942439 1797:0003-6846 1735:211422987 1699:on Github 1265:cite book 1225:CiteSeerX 648:222070383 640:1556-6056 266:CPU-bound 147:in 1997. 145:Adam Back 113:incentive 85:consensus 54:Moni Naor 50:verifiers 4620:Internet 4577:Category 4483:Kademlia 4443:Codetext 4386:(CSPRNG) 4132:CRYPTREC 3963:Poly1305 3883:yescrypt 3797:Streebog 3677:CubeHash 3657:(winner) 3479:Category 3201:Coinbase 3181:Bitstamp 3161:Bitpanda 3151:bitFlyer 3146:Bitfinex 3070:SafeMoon 3030:Filecoin 3009:USD Coin 2872:Polkadot 2867:Peercoin 2847:Gridcoin 2841:Ethereum 2821:Algorand 2798:Vertcoin 2768:AmbaCoin 2698:Equihash 2688:Litecoin 2683:Dogecoin 2643:Ethereum 2619:Peercoin 2614:Namecoin 2609:MazaCoin 2511:MetaMask 2400:Category 2349:GHash.io 2344:CoinDesk 2295:Deep Web 2218:Currency 2082:Jihan Wu 1894:Bit gold 1891:bit gold 1858:Archived 1828:Archived 1824:euronews 1739:Archived 1693:Archived 1669:Archived 1647:Archived 1628:Archived 1604:Archived 1573:Archived 1548:Archived 1515:Archived 1482:Archived 1449:Archived 1436:(2004). 1373:(1997). 1290:Archived 1257:14434713 1193:Archived 1139:Archived 999:Archived 936:Archived 900:Archived 871:Archived 832:Archived 795:Archived 766:Archived 737:Archived 707:(1993). 523:See also 508:New York 401:Hashcash 347:Hokkaido 341:Moderate 291:shortcut 234:Hashcash 204:Variants 158:spamming 149:Hashcash 141:Hashcash 4594:Portals 4253:General 4038:Attacks 3968:SipHash 3924:CBC-MAC 3858:LM hash 3838:Balloon 3702:HAS-160 3491:Commons 3370:Airdrop 3349:IQ.Wiki 3314:Mt. Gox 3285:Defunct 3271:Uniswap 3231:Genesis 3166:Bithumb 3141:Binance 3113:OneCoin 3075:Stellar 2956:The DAO 2946:Polygon 2916:Aventus 2831:Cardano 2624:Titcoin 2589:Bitcoin 2580:SHA-256 2410:Commons 2334:Bitmain 2243:History 2017:Wei Dai 1951:History 1940:Bitcoin 1883:at the 1610:30 June 1419:NDSS 99 1385:151–160 529:Bitcoin 397:Bitcoin 385:WalkSAT 370:At the 332:Puzzles 312:Weaken 285:tokens. 198:bitcoin 81:Bitcoin 4364:Keygen 4198:Pepper 4137:NESSIE 4084:Design 3878:scrypt 3873:PBKDF2 3848:Catena 3843:bcrypt 3833:Argon2 3792:Snefru 3787:Shabal 3782:SWIFFT 3762:RIPEMD 3757:N-hash 3732:MASH-2 3727:MASH-1 3712:Kupyna 3672:BLAKE3 3655:Keccak 3640:Grøstl 3617:BLAKE2 3324:Thodex 3251:Kucoin 3246:Kraken 3226:Gemini 3196:Circle 3171:BitMEX 3156:Bitkub 3103:Coinye 3065:Ripple 3040:Helium 3004:Tether 2904:tokens 2902:ERC-20 2877:Solana 2836:EOS.IO 2740:-based 2728:Monero 2700:-based 2678:Coinye 2661:-based 2659:Scrypt 2636:-based 2634:Ethash 2582:-based 2279:Movies 2202:Client 2179:SegWit 1975:People 1803:  1795:  1733:  1399:  1255:  1245:  1227:  1185:  1109:  729:  646:  638:  356:–based 344:Mbound 165:e-mail 46:prover 4394:(PRN) 3992:modes 3868:Makwa 3863:Lyra2 3853:crypt 3802:Tiger 3752:MDC-2 3707:HAVAL 3692:Fugue 3650:Skein 3635:BLAKE 3612:SHA-3 3607:SHA-2 3601:SHA-1 3292:BTC-e 3276:Upbit 3236:Huobi 3221:eToro 3176:Bitso 3118:Petro 2999:Terra 2941:Minds 2911:Augur 2887:Tezos 2882:Steem 2843:(2.0) 2793:Verge 2761:Other 2752:Petro 2712:Zcash 2645:(1.0) 2329:BitGo 2194:Forks 2184:SHA-2 2159:ECDSA 2096:Lists 1801:S2CID 1731:S2CID 1518:(PDF) 1507:(PDF) 1452:(PDF) 1441:(PDF) 1346:(PDF) 1335:(PDF) 1253:S2CID 1196:(PDF) 1167:(PDF) 962:(PDF) 835:(PDF) 822:(PDF) 644:S2CID 580:Notes 183:SHA-1 117:value 42:proof 4193:Salt 4157:CNSA 4024:IAPM 3978:VMAC 3973:UMAC 3958:PMAC 3953:CMAC 3949:OMAC 3944:NMAC 3939:HMAC 3934:GMAC 3903:HKDF 3772:SIMD 3722:Lane 3697:GOST 3682:ECOH 3569:List 3556:and 3503:List 3256:Kuna 3186:BTCC 3136:Abra 3055:Nano 3045:Luna 3025:Chia 2984:Diem 2961:TRON 2778:IOTA 2773:Firo 2747:Dash 2604:LBRY 2526:Web3 2501:Fork 2354:Nuri 1854:CNBC 1793:ISSN 1677:2020 1612:2014 1581:2020 1526:2022 1397:ISBN 1271:link 1243:ISBN 1183:ISBN 1107:ISBN 1064:help 944:2022 843:2020 727:ISBN 636:ISSN 372:IACR 128:work 105:work 66:spam 56:and 4029:OCB 4019:GCM 4014:EAX 4009:CWC 3999:CCM 3929:DAA 3807:VSH 3777:SM3 3747:MD6 3742:MD4 3737:MD2 3717:LSH 3687:FSB 3595:MD5 3297:FTX 3261:OKX 3191:BUX 3060:NEO 2994:Pax 2979:Dai 2931:Kin 2892:TON 2862:Nxt 2857:Kin 2738:X11 2169:P2P 1783:hdl 1773:doi 1723:doi 1389:doi 1235:doi 1175:doi 1097:doi 717:doi 674:doi 626:doi 35:PoW 4644:: 3645:JH 1896:. 1856:. 1852:. 1826:. 1822:. 1799:. 1791:. 1781:. 1769:53 1767:. 1763:. 1737:. 1729:. 1719:22 1717:. 1713:. 1667:. 1598:. 1546:. 1542:. 1513:. 1509:. 1480:. 1476:. 1447:. 1443:. 1395:. 1387:. 1379:. 1369:; 1337:. 1315:. 1288:. 1267:}} 1263:{{ 1251:. 1241:. 1233:. 1211:^ 1191:. 1181:. 1169:. 1154:^ 1137:. 1133:. 1121:^ 1105:. 1087:; 1083:; 1072:^ 1055:: 1053:}} 1049:{{ 1041:. 1026:^ 997:. 970:^ 934:. 930:. 924:. 898:. 894:. 869:. 865:. 854:^ 845:. 824:. 810:^ 793:. 789:. 764:. 760:. 735:. 725:. 711:. 703:; 688:^ 668:. 656:^ 642:. 634:. 622:19 620:. 616:. 450:. 437:. 4596:: 4238:e 4231:t 4224:v 3951:/ 3546:e 3539:t 3532:v 2444:e 2437:t 2430:v 1932:e 1925:t 1918:v 1867:. 1837:. 1807:. 1785:: 1775:: 1748:. 1725:: 1679:. 1614:. 1583:. 1557:. 1528:. 1491:. 1461:. 1421:. 1405:. 1391:: 1355:. 1319:. 1299:. 1273:) 1259:. 1237:: 1205:. 1177:: 1148:. 1115:. 1099:: 1066:) 1062:( 1043:5 1008:. 982:. 964:. 946:. 909:. 880:. 804:. 775:. 746:. 719:: 682:. 676:: 650:. 628:: 236:. 88:( 33:( 20:)

Index

Proof-of-work
cryptographic
proof
Moni Naor
Cynthia Dwork
denial-of-service attacks
spam
Markus Jakobsson
Hal Finney
Bitcoin
consensus
proof of stake
Sybil deterrence mechanisms
cryptocurrencies
client puzzle
incentive
value
algorithms
work
Adam Back
Hashcash
spamming
e-mail


SHA-1
bitcoin

Hashcash

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑