Knowledge

Proof of work

Source đź“ť

481:, and their solutions must be agreed upon by all nodes and reach consensus. The solutions are then used to validate transactions, add blocks and generate new bitcoins. Miners are rewarded for solving these puzzles and successfully adding new blocks. However, the Bitcoin-style mining process is very energy intensive because the proof of work shaped like a lottery mechanism. The underlying computational work has no other use but to provide security to the network that provides open access and has to work in adversarial conditions. Miners have to use a lot of energy to add a new block containing a transaction to the blockchain. The energy used in this competition is what fundamentally gives bitcoin its level of security and resistance to attacks. Also, miners have to invest computer hardwares that need large spaces as fixed cost. 4587: 4611: 230: 4599: 210: 406: 4557: 3458: 2385: 3482: 3470: 2395: 204:
protocols assume a direct interactive link between the requester (client) and the provider (server). The provider chooses a challenge, say an item in a set with a property, the requester finds the relevant response in the set, which is sent back and checked by the provider. As the challenge is chosen
434:
Each block that is added to the blockchain, starting with the block containing a given transaction, is called a confirmation of that transaction. Ideally, merchants and services that receive payment in the cryptocurrency should wait for at least one confirmation to be distributed over the network,
140:
in 1997. It was designed as an anti-spam mechanism that required email senders to perform a small computational task, effectively proving that they expended resources (in the form of CPU time) before sending an email. This task was trivial for legitimate users but would impose a significant cost on
184:
Whether PoW systems can actually solve a particular denial-of-service issue such as the spam problem is subject to debate; the system must make sending spam emails obtrusively unproductive for the spammer, but should also not prevent legitimate users from sending their messages. In other words, a
458:
Some PoWs claim to be ASIC-resistant, i.e. to limit the efficiency gain that an ASIC can have over commodity hardware, like a GPU, to be well under an order of magnitude. ASIC resistance has the advantage of keeping mining economically feasible on commodity hardware, but also contributes to the
392:
PoW. But in Bitcoin, double-spend protection is provided by a decentralized P2P protocol for tracking transfers of coins, rather than the hardware trusted computing function used by RPoW. Bitcoin has better trustworthiness because it is protected by computation. Bitcoins are "mined" using the
435:
before assuming that the payment was done. The more confirmations that the merchant waits for, the more difficult it is for an attacker to successfully reverse the transaction in a blockchain—unless the attacker controls more than half the total network power, in which case it is called a
282:
computations that allow participants who know a secret, typically a private key, to generate cheap PoWs. The rationale is that mailing-list holders may generate stamps for every recipient without incurring a high cost. Whether such a feature is desirable depends on the usage scenario.
220:
protocols do not assume such a link: as a result, the problem must be self-imposed before a solution is sought by the requester, and the provider must check both the problem choice and the found solution. Most such schemes are unbounded probabilistic iterative procedures such as
185:
genuine user should not encounter any difficulties when sending an email, but an email spammer would have to expend a considerable amount of computing power to send out many emails at once. Proof-of-work systems are being used by other, more complex cryptographic systems such as
273:
if the client must perform few computations, but must collect some tokens from remote servers before querying the final service provider. In this sense, the work is not actually performed by the requester, but it incurs delays anyway because of the latency to get the required
123:
was carried out or that a computational puzzle was "solved", but deterring manipulation of data by establishing large energy and hardware-control requirements to be able to do so. Proof-of-work systems have been criticized by environmentalists for their energy consumption.
144:
Hashcash's system was based on the concept of finding a hash value that met certain criteria, a task that required computational effort and thus served as a "proof of work." The idea was that by making it computationally expensive to send large volumes of email,
205:
on the spot by the provider, its difficulty can be adapted to its current load. The work on the requester side may be bounded if the challenge-response protocol has a known solution (chosen by the provider), or is known to exist within a bounded search space.
455:(ASICs) for PoW. This trend toward mining pools and specialized ASICs has made mining some cryptocurrencies economically infeasible for most players without access to the latest ASICs, nearby sources of inexpensive energy, or other special advantages. 507:
in to continue mining without the use of renewable energy but they will not be allowed to expand or renew permits with the state, no new mining companies that do not completely use renewable energy will not also not be allowed to begin mining.
417:
cryptocurrency. Studies have estimated the total energy consumption of cryptocurrency mining. The PoW mechanism requires a vast amount of computing resources, which consume a significant amount of electricity. 2018 estimates from the
367:
based on "proof of useful work" (PoUW). Rather than miners consuming energy in solving complex, but essentially useless, puzzles to validate transactions, Ofelimos achieves consensus while simultaneously providing a decentralized
924: 80:
in a permissionless decentralized network, in which miners compete to append blocks and mine new currency, each miner experiencing a success probability proportional to the computational effort expended. PoW and PoS
1816: 41:) that a certain amount of a specific computational effort has been expended. Verifiers can subsequently confirm this expenditure with minimal effort on their part. The concept was first implemented in 100:– the computation – must be moderately hard (yet feasible) on the prover or requester side but easy to check for the verifier or service provider. This idea is also known as a CPU cost function, 1887:
Describes a complete money system (including generation, storage, assay, and transfer) based on proof of work functions and the machine architecture problem raised by the use of these functions.
372:. The protocol is built around Doubly Parallel Local Search (DPLS), a local search algorithm that is used as the PoUW component. The paper gives an example that implements a variant of 61:
on a network by requiring some work from a service requester, usually meaning processing time by a computer. The term "proof of work" was first coined and formalized in a 1999 paper by
910: 820: 244:(with the same mean). A generic technique for reducing variance is to use multiple independent sub-challenges, as the average of multiple samples will have a lower variance. 1846: 132:
The concept of Proof of Work (PoW) has its roots in early research on combating spam and preventing denial-of-service attacks. One of the earliest implementations of PoW was
393:
Hashcash proof-of-work function by individual miners and verified by the decentralized nodes in the P2P bitcoin network. The difficulty is periodically adjusted to keep the
1592: 267:
where the computation speed is bound by main memory accesses (either latency or bandwidth), the performance of which is expected to be less sensitive to hardware evolution.
1007: 312: 1808: 4537: 4367: 1437: 360: 1503: 1657: 1259: 859: 178:
including the colon and any amount of whitespace following it up to the digit '1') begins with 52 binary zeros, that is 13 hexadecimal zeros:
4220: 1635: 807: 4140: 3528: 1949: 3557: 2431: 2147: 888: 459:
corresponding risk that an attacker can briefly rent access to a large amount of unspecialized commodity processing power to launch a
152:
One popular system, used in Hashcash, uses partial hash inversions to prove that computation was done, as a goodwill token to send an
485: 3418: 1838: 987: 754: 725: 2106: 1584: 1301: 783: 452: 1727: 236:
Known-solution protocols tend to have slightly lower variance than unbounded probabilistic protocols because the variance of a
4156: 3398: 1389: 1235: 1175: 1099: 719: 4591: 1320: 581: 165: 158: 3917: 3073: 4084: 3214: 4213: 3408: 2474: 1919: 237: 1954: 1406:
Juels, Ari; Brainard, John (1999). "Client puzzles: A cryptographic defense against connection depletion attacks".
1181: 3521: 3474: 2814: 2000: 1891: 472: 324: 311:
Partial hash inversion This paper formalizes the idea of a proof of work and introduces "the dependent idea of a
66: 1839:"New York governor signs first-of-its-kind law cracking down on bitcoin mining — here's everything that's in it" 1681: 388:
network went online. Bitcoin is a proof-of-work digital currency that, like Finney's RPoW, is also based on the
4416: 4125: 3610: 3562: 2909: 2424: 2258: 1127: 3912: 3388: 2819: 2101: 1470: 1426: 4206: 4130: 2865: 2524: 2275: 1616: 1492: 562: 364: 77: 4641: 4532: 4487: 4300: 3899: 3541: 3537: 2469: 2238: 348: 2977: 1653: 69:
in 2004 through the idea of "reusable proof of work" using the 160-bit secure hash algorithm 1 (SHA-1).
4577: 4411: 3514: 3302: 2939: 363:
conference Crypto 2022 researchers presented a paper describing Ofelimos, a blockchain protocol with a
1278: 1208:
Abliz, Mehmud; Znati, Taieb (December 2009). "A Guided Tour Puzzle for Denial of Service Prevention".
4636: 4527: 3795: 3462: 3428: 3403: 3383: 3058: 3048: 2860: 2417: 2253: 2091: 369: 302: 3600: 1536: 1218: 1052: 1010:, a specific comparison that shows how different classes of devices have different processing power. 851: 4517: 4507: 4362: 4135: 3971: 3670: 3665: 3486: 3433: 3353: 2398: 54: 4512: 4502: 4305: 4265: 4258: 4248: 4243: 4058: 3878: 3111: 2987: 2972: 2726: 2587: 1632: 419: 1561: 1463:"An (almost) constant-effort solution-verification proof-of-work protocol based on Merkle trees" 1373: 1364: 4253: 4166: 3552: 3368: 3101: 2944: 2929: 2914: 2840: 2781: 2740: 2459: 2352: 1213: 156:. For instance, the following header represents about 2 hash computations to send a message to 101: 1869: 4631: 4560: 4406: 4352: 4181: 3831: 3785: 3675: 3633: 3618: 3423: 3378: 3038: 3008: 2949: 2761: 2735: 2479: 2464: 2248: 2182: 2137: 2096: 1980: 1912: 1039: 557: 423: 120: 880: 4522: 4446: 3851: 3755: 3705: 3680: 3043: 2967: 2934: 2919: 2845: 1975: 1944: 241: 1882: 1697: 8: 4285: 4176: 4053: 4002: 3941: 3841: 3760: 3720: 3700: 3224: 2060: 1355: 915: 815: 542: 983: 4615: 4391: 4375: 4322: 4110: 4094: 4043: 3628: 3028: 2982: 2533: 2504: 2484: 2305: 2243: 2050: 1939: 1789: 1719: 1253: 1241: 1073: 746: 697: 632: 532: 775: 229: 4451: 4441: 4312: 3987: 3285: 2766: 2494: 2489: 2197: 2152: 1793: 1781: 1723: 1385: 1231: 1171: 1095: 1027: 715: 636: 624: 295: 109: 58: 4598: 1699: 1245: 499:
enacted a two-year moratorium on cryptocurrency mining that does not completely use
104:, computational puzzle, or CPU pricing function. Another common feature is built-in 4386: 4074: 4028: 3790: 3443: 3393: 3373: 3229: 3209: 3179: 2904: 2899: 2880: 2637: 2388: 2311: 2055: 2015: 1905: 1771: 1761: 1711: 1377: 1223: 1163: 1085: 836:
the two best-known – and in the context of cryptocurrencies also most commonly used
705: 662: 614: 500: 496: 209: 62: 2010: 1766: 1749: 984:"Proof of Work can work - Fifth Workshop on the Economics of Information Security" 405: 394: 4603: 4089: 4038: 4033: 3821: 3536: 3413: 3363: 3174: 2327: 2283: 2122: 2030: 1873: 1685: 1639: 1620: 1090: 1084:. Lecture Notes in Computer Science. Vol. 2729. Springer. pp. 426–444. 667: 654: 601:
Lachtar, Nada; Elkhail, Abdulrahman Abu; Bacha, Anys; Malik, Hafiz (2020-07-01).
1167: 1023: 704:. Lecture Notes in Computer Science. Vol. 740. Springer. pp. 139–147. 413:
Since the creation of Bitcoin, proof-of-work has been the predominant design of
4461: 4381: 4342: 4290: 4275: 4079: 3807: 3239: 3169: 3119: 3023: 2800: 2771: 2543: 2538: 2509: 2440: 2365: 2342: 2132: 1990: 1970: 1331: 1162:. Lecture Notes in Computer Science. Vol. 8976. Springer. pp. 49–62. 920: 552: 547: 527: 489: 258: 90: 82: 967:
Laurie, Ben; Clayton, Richard (May 2004). "Proof-of-work proves not to work".
947: 108:-structures that reward allocating computational capacity to the network with 4625: 4542: 4497: 4456: 4436: 4332: 4295: 4270: 4048: 3292: 2075: 2035: 2020: 1785: 1422: 1381: 1359: 1069: 710: 689: 628: 619: 602: 537: 488:
Erik Thedéen called on the EU to ban the proof of work model in favor of the
50: 30: 3750: 4492: 4337: 4327: 4317: 4280: 4229: 2695: 2582: 2370: 2218: 2213: 2157: 2065: 1715: 414: 86: 27: 1227: 4471: 4161: 4007: 3936: 3932: 3438: 3327: 3199: 3063: 2360: 2142: 2045: 1698:
Savva Shanaev; Arina Shuraeva; Mikhail Vasenin; Maksim Kuznetsov (2019).
504: 460: 448: 436: 342: 1776: 1300:
Gabber, Eran; Jakobsson, Markus; Matias, Yossi; Mayer, Alain J. (1998).
4431: 4401: 4396: 4357: 3358: 3249: 3194: 3081: 3033: 2959: 2661: 2656: 2454: 2127: 2025: 1995: 1679:
tevador/RandomX: Proof of work algorithm based on random code execution
1152: 522: 4421: 3836: 3715: 3189: 3091: 3018: 2924: 2776: 2040: 1985: 1678: 1077: 693: 137: 116: 105: 46: 3623: 4466: 4426: 4115: 4012: 3997: 3992: 3982: 3946: 3866: 3780: 3660: 3184: 3164: 3144: 3134: 3129: 3053: 3013: 2992: 2855: 2835: 2829: 2809: 2786: 2756: 2686: 2676: 2671: 2631: 2622: 2607: 2602: 2597: 2499: 2409: 2337: 2332: 2070: 1879: 1809:"Ban proof of work crypto mining to save energy, EU regulator says" 1748:
Ciaian, Pavel; Kancs, d’Artis; Rajcaniova, Miroslava (2021-10-21).
1700:"Cryptocurrency Value and 51% Attacks: Evidence from Event Studies" 659:
Secure Information Networks: Communications and Multimedia Security
503:
as a power source for two years. Existing mining companies will be
389: 222: 146: 133: 42: 1462: 1321:"Defending against denial-of-service attacks with puzzle auctions" 1119: 447:
Within the Bitcoin community there are groups working together in
247:
There are also fixed-cost functions such as the time-lock puzzle.
3951: 3907: 3685: 3332: 3297: 3254: 3149: 3124: 3096: 2870: 2612: 2577: 2322: 2005: 1928: 911:"Analysis | Bye-Bye, Miners! How Ethereum's Big Change Will Work" 517: 478: 385: 373: 250:
Moreover, the underlying functions used by these schemes may be:
186: 73: 1613: 1120:"Exponential memory-bound functions for proof of work protocols" 603:"A Cross-Stack Approach Towards Defending Against Cryptojacking" 4347: 4120: 3861: 3856: 3826: 3816: 3775: 3770: 3765: 3745: 3740: 3710: 3695: 3655: 3307: 3234: 3154: 3139: 3086: 2890: 2824: 2716: 2666: 2647: 2167: 153: 96:
A key feature of proof-of-work schemes is their asymmetry: the
1372:. Lecture Notes in Computer Science. Vol. 1318. pp.  852:"Proof of Work Explained in Simple Terms - The Chain Bulletin" 261:, as well as from high-end server to low-end portable devices. 170:
It is verified with a single computation by checking that the
3846: 3735: 3690: 3638: 3595: 3590: 3584: 3337: 3275: 3259: 3219: 3204: 3159: 2875: 2700: 2568: 2317: 2172: 1427:"New client puzzle outsourcing techniques for DoS resistance" 171: 16:
System that regulates the formation of blocks on a blockchain
1153:"Cuckoo Cycle: A Memory Bound Graph-Theoretic Proof-of-Work" 65:
and Ari Juels. The concept was adapted to digital tokens by
3961: 3956: 3927: 3922: 3886: 2592: 2514: 1434:
11th ACM Conference on Computer and Communications Security
1897: 1582: 1420: 1299: 257:
where the computation runs at the speed of the processor,
3730: 3725: 3578: 3280: 3244: 2850: 1557: 1529:"Cambridge Bitcoin Electricity Consumption Index (CBECI)" 1528: 1022: 600: 1274: 1080:(2003). "On Memory-Bound Functions for Fighting Spam". 4368:
Cryptographically secure pseudorandom number generator
969:
Workshop on the Economics of Information Security 2004
376:, a local search algorithm to solve Boolean problems. 4575: 1747: 1493:"Combinatorial Optimization via Proof-of-Useful-Work" 1210:
2009 Annual Computer Security Applications Conference
3498: 1290:
A popular PoW system. First announced in March 1997.
1026:; Burrows, Mike; Manasse, Mark; Wobber, Ted (2005). 1363: 286: 197:There are two classes of proof-of-work protocols. 1558:"Cambridge Bitcoin Electricity Consumption Index" 1068: 477:Miners compete to solve crypto challenges on the 291:Here is a list of known proof-of-work functions: 4623: 948:"Hashcash - A Denial of Service Counter-Measure" 881:"The Only Crypto Story You Need, by Matt Levine" 698:"Pricing via Processing or Combatting Junk Mail" 1421:Waters, Brent; Juels, Ari; Halderman, John A.; 1302:"Curbing junk e-mail via secure classification" 1064: 1062: 802: 800: 578:On most Unix systems this can be verified with 422:equate Bitcoin's energy consumption to that of 1365:"Auditable metering with lightweight security" 1354: 1018: 1016: 962: 960: 652: 354: 308:Ong–Schnorr–Shamir signature broken by Pollard 4214: 3522: 2425: 1913: 1750:"The economic dependency of bitcoin security" 1583:Michael J. Casey; Paul Vigna (16 June 2014). 1414: 1405: 1319:Wang, Xiao-Feng; Reiter, Michael (May 2003). 966: 379: 315:", a "re-usable proof-of-work" (RPoW) system. 1560:. Cambridge Center For Alternative Finance. 1293: 1059: 797: 776:"What Is Proof of Work (PoW) in Blockchain?" 684: 682: 680: 678: 655:"Proofs of Work and Bread Pudding Protocols" 1399: 1013: 957: 648: 646: 189:, which uses a system similar to Hashcash. 141:spammers attempting to send bulk messages. 4221: 4207: 3529: 3515: 3481: 2432: 2418: 1920: 1906: 1894:for Simplified Payment Verification (SPV). 1328:IEEE Symposium on Security and Privacy '03 1318: 1258:: CS1 maint: location missing publisher ( 1207: 1203: 1201: 1146: 1144: 1113: 1111: 409:Bitcoin electricity consumption as of 2021 1775: 1765: 1348: 1312: 1217: 1089: 1028:"Moderately hard, memory-bound functions" 975: 709: 688: 675: 666: 618: 486:European Securities and Markets Authority 466: 442: 181:0000000000000756af69e2ffbdb930261873cd71 1585:"Short-Term Fixes To Avert "51% Attack"" 1160:Financial Cryptography and Data Security 1008:How powerful was the Apollo 11 computer? 643: 453:application-specific integrated circuits 404: 174:hash of the stamp (omit the header name 2107:List of people in blockchain technology 1837:Sigalos, MacKenzie (23 November 2022). 1836: 1806: 1454: 1198: 1141: 1108: 982:Liu, Debin; Camp, L. Jean (June 2006). 981: 661:. Kluwer Academic Publishers: 258–272. 429: 72:Proof of work was later popularized by 4624: 3268: 1704:The Journal of Alternative Investments 1651: 1564:from the original on 29 September 2020 1460: 1266: 1117: 908: 653:Jakobsson, Markus; Juels, Ari (1999). 492:model due its lower energy emissions. 4202: 3510: 3399:Decentralized autonomous organization 2413: 1901: 1521: 1509:from the original on 9 September 2022 1150: 400: 93:they are the most common mechanisms. 3469: 2439: 2394: 1654:"The State of Cryptocurrency Mining" 1614:Overview of the Bitcoin mining pools 1082:Advances in Cryptology - CRYPTO 2003 945: 927:from the original on 2 December 2021 846: 844: 1595:from the original on 15 August 2020 1576: 702:Advances in Cryptology — CRYPTO' 92 136:, created by British cryptographer 13: 1660:from the original on 10 March 2020 1212:. Honolulu, HI. pp. 279–288. 909:Kharif, Olga (November 30, 2021). 607:IEEE Computer Architecture Letters 583::::9B760005E92F0DAE | openssl sha1 484:In January 2022 Vice-Chair of the 228: 208: 14: 4653: 3409:Distributed ledger technology law 1876: (archived December 22, 2007) 1863: 1490: 1467:Cryptology ePrint Archive, Report 1124:Cryptology ePrint Archive, Report 841: 826:from the original on 27 June 2023 808:"Cryptocurrencies and blockchain" 57:and other service abuses such as 4609: 4597: 4585: 4556: 4555: 4228: 3480: 3468: 3457: 3456: 2393: 2384: 2383: 1892:Merkle Proof Standardised Format 1272: 747:"RPOW - Reusable Proofs of Work" 278:Finally, some PoW systems offer 240:is lower than the variance of a 1849:from the original on 2022-12-03 1830: 1819:from the original on 2022-04-19 1800: 1741: 1730:from the original on 2021-02-06 1691: 1672: 1645: 1626: 1607: 1550: 1539:from the original on 2020-03-02 1484: 1473:from the original on 2016-08-26 1443:from the original on 2021-04-21 1281:from the original on 2017-09-29 1187:from the original on 2017-07-05 1130:from the original on 2018-04-09 1001: 990:from the original on 2017-08-20 939: 891:from the original on 2023-04-07 862:from the original on 2023-04-01 786:from the original on 2024-01-17 757:from the original on 2023-06-19 728:from the original on 2017-11-26 473:Environmental impact of bitcoin 287:List of proof-of-work functions 112:in the form of cryptocurrency. 4417:Information-theoretic security 4126:NIST hash function competition 2259:2020 Twitter account hijacking 902: 873: 768: 739: 594: 574: 495:In November 2022 the state of 1: 4592:Free and open-source software 2102:List of bitcoin organizations 1767:10.1080/00036846.2021.1931003 1652:Vorick, David (13 May 2018). 588: 127: 115:The purpose of proof-of-work 4131:Password Hashing Competition 3542:message authentication codes 3538:Cryptographic hash functions 2276:The Rise and Rise of Bitcoin 1396:Updated version May 4, 1998. 1091:10.1007/978-3-540-45146-4_25 668:10.1007/978-0-387-35568-9_18 563:Consensus (computer science) 259:which greatly varies in time 119:is not proving that certain 85:) remain the two best known 7: 4533:Message authentication code 4488:Cryptographic hash function 4301:Cryptographic hash function 4085:Merkle–DamgĂĄrd construction 2470:Cryptographic hash function 2239:Bitcoin scalability problem 1927: 1807:Bateman, Tom (2022-01-19). 1500:IACR conference Crypto 2022 1168:10.1007/978-3-662-48051-9_4 511: 370:optimization problem solver 355:Proof of useful work (PoUW) 349:Guided tour puzzle protocol 192: 87:Sybil deterrence mechanisms 10: 4658: 4412:Harvest now, decrypt later 946:Back, Adam (August 2002). 470: 463:against a cryptocurrency. 380:Bitcoin-type proof of work 296:Integer square root modulo 53:in 1993 as a way to deter 4551: 4528:Post-quantum cryptography 4480: 4236: 4198: 4149: 4103: 4067: 4021: 3970: 3898: 3875: 3804: 3648: 3609: 3571: 3548: 3506: 3502: 3452: 3429:Initial exchange offering 3404:Decentralized application 3384:Cryptocurrency in Nigeria 3346: 3320: 3110: 3072: 3001: 2958: 2889: 2799: 2749: 2725: 2709: 2685: 2646: 2621: 2567: 2557: 2523: 2447: 2379: 2351: 2294: 2267: 2254:2018 Bitcoin bomb threats 2249:2018 cryptocurrency crash 2231: 2206: 2190: 2181: 2115: 2092:List of bitcoin companies 2084: 1963: 1935: 55:denial-of-service attacks 4518:Quantum key distribution 4508:Authenticated encryption 4363:Random number generation 3879:key derivation functions 3434:List of cryptocurrencies 3321:Crypto service companies 3112:Cryptocurrency exchanges 1382:10.1007/3-540-63594-7_75 711:10.1007/3-540-48071-4_10 620:10.1109/LCA.2020.3017457 568: 238:rectangular distribution 164:X-Hashcash: 1:52:380119: 37:) proves to others (the 33:in which one party (the 4513:Public-key cryptography 4503:Symmetric-key algorithm 4306:Key derivation function 4266:Cryptographic primitive 4259:Authentication protocol 4249:Outline of cryptography 4244:History of cryptography 4157:Hash-based cryptography 4059:Length extension attack 1591:. Wall Street Journal. 1461:Coelho, Fabien (2007). 1118:Coelho, Fabien (2005). 420:University of Cambridge 4254:Cryptographic protocol 4167:Message authentication 3369:Complementary currency 2475:Decentralized exchange 2460:Cryptocurrency tumbler 2353:Bitcoin in El Salvador 1716:10.3905/jai.2019.1.081 1370:Financial Cryptography 1306:Financial Cryptography 1047:Cite journal requires 467:Environmental concerns 443:ASICs and mining pools 410: 397:around a target time. 313:bread pudding protocol 233: 213: 4407:End-to-end encryption 4353:Cryptojacking malware 3424:Initial coin offering 3379:Cryptocurrency bubble 2910:Basic Attention Token 2480:Decentralized finance 2465:Cryptocurrency wallet 2138:Cryptocurrency wallet 2097:List of bitcoin forks 1955:Environmental effects 1633:What is an ASIC miner 1228:10.1109/ACSAC.2009.33 751:nakamotoinstitute.org 558:Proof of elapsed time 408: 232: 218:Solution–verification 212: 161:on January 19, 2038: 4523:Quantum cryptography 4447:Trusted timestamping 3419:Environmental impact 3389:Cryptocurrency scams 1976:Andreas Antonopoulos 1642:on digitaltrends.com 1356:Franklin, Matthew K. 1151:Tromp, John (2015). 580:echo -n 1:52:380119: 430:History modification 242:Poisson distribution 167::::9B760005E92F0DAE 89:. In the context of 76:as a foundation for 4286:Cryptographic nonce 4054:Side-channel attack 3074:Inactive currencies 916:The Washington Post 816:European Parliament 543:Proof of personhood 365:consensus mechanism 149:would be reduced. 4642:Energy consumption 4392:Subliminal channel 4376:Pseudorandom noise 4323:Key (cryptography) 4111:CAESAR Competition 4095:HAIFA construction 4044:Brute-force attack 2534:Proof of authority 2505:Non-fungible token 2485:Distributed ledger 2306:Bitcoin Foundation 2244:History of bitcoin 2051:Cameron Winklevoss 1684:2021-09-01 at the 1638:2018-05-22 at the 1623:on blockchain.info 1619:2020-04-21 at the 533:Proof of authority 479:Bitcoin blockchain 451:. Some miners use 411: 401:Energy consumption 234: 214: 202:Challenge–response 4573: 4572: 4569: 4568: 4452:Key-based routing 4442:Trapdoor function 4313:Digital signature 4194: 4193: 4190: 4189: 3988:ChaCha20-Poly1305 3805:Password hashing/ 3496: 3495: 3316: 3315: 2795: 2794: 2495:Lightning Network 2407: 2406: 2299: 2227: 2226: 2198:Bitcoin Unlimited 2153:Lightning Network 1760:(49): 5738–5755. 1754:Applied Economics 1491:Fitzi, Matthias. 1423:Felten, Edward W. 1391:978-3-540-63594-9 1237:978-1-4244-5327-6 1177:978-3-662-48050-2 1101:978-3-540-40674-7 856:chainbulletin.com 721:978-3-540-57340-1 4649: 4637:Cryptocurrencies 4614: 4613: 4612: 4602: 4601: 4590: 4589: 4588: 4581: 4559: 4558: 4387:Insecure channel 4223: 4216: 4209: 4200: 4199: 4075:Avalanche effect 4029:Collision attack 3572:Common functions 3531: 3524: 3517: 3508: 3507: 3504: 3503: 3500: 3499: 3484: 3483: 3472: 3471: 3460: 3459: 3444:Virtual currency 3394:Digital currency 3374:Crypto-anarchism 3266: 3265: 3019:HBAR (Hashgraph) 3002:Other currencies 2638:Ethereum Classic 2565: 2564: 2441:Cryptocurrencies 2434: 2427: 2420: 2411: 2410: 2397: 2396: 2387: 2386: 2312:Bitcoin Magazine 2297: 2188: 2187: 2056:Tyler Winklevoss 2016:Satoshi Nakamoto 1922: 1915: 1908: 1899: 1898: 1858: 1857: 1855: 1854: 1834: 1828: 1827: 1825: 1824: 1804: 1798: 1797: 1779: 1769: 1745: 1739: 1738: 1736: 1735: 1695: 1689: 1676: 1670: 1669: 1667: 1665: 1649: 1643: 1630: 1624: 1611: 1605: 1604: 1602: 1600: 1580: 1574: 1573: 1571: 1569: 1554: 1548: 1547: 1545: 1544: 1525: 1519: 1518: 1516: 1514: 1508: 1497: 1488: 1482: 1481: 1479: 1478: 1458: 1452: 1451: 1449: 1448: 1442: 1431: 1418: 1412: 1411: 1403: 1397: 1395: 1367: 1352: 1346: 1345: 1343: 1342: 1336: 1330:. Archived from 1325: 1316: 1310: 1309: 1297: 1291: 1289: 1287: 1286: 1270: 1264: 1263: 1257: 1249: 1221: 1205: 1196: 1195: 1193: 1192: 1186: 1157: 1148: 1139: 1138: 1136: 1135: 1115: 1106: 1105: 1093: 1074:Goldberg, Andrew 1066: 1057: 1056: 1050: 1045: 1043: 1035: 1020: 1011: 1005: 999: 998: 996: 995: 979: 973: 972: 964: 955: 954: 952: 943: 937: 936: 934: 932: 906: 900: 899: 897: 896: 877: 871: 870: 868: 867: 848: 839: 838: 833: 831: 825: 812: 804: 795: 794: 792: 791: 772: 766: 765: 763: 762: 743: 737: 736: 734: 733: 713: 686: 673: 672: 670: 650: 641: 640: 622: 598: 584: 577: 501:renewable energy 177: 160: 91:cryptocurrencies 63:Markus Jakobsson 4657: 4656: 4652: 4651: 4650: 4648: 4647: 4646: 4622: 4621: 4620: 4610: 4608: 4596: 4586: 4584: 4576: 4574: 4565: 4547: 4476: 4232: 4227: 4186: 4145: 4104:Standardization 4099: 4090:Sponge function 4063: 4039:Birthday attack 4034:Preimage attack 4017: 3973: 3966: 3894: 3877: 3876:General purpose 3871: 3806: 3800: 3649:Other functions 3644: 3611:SHA-3 finalists 3605: 3567: 3544: 3535: 3497: 3492: 3448: 3414:Double-spending 3364:Blockchain game 3342: 3312: 3264: 3106: 3068: 2997: 2954: 2885: 2791: 2745: 2721: 2705: 2681: 2642: 2617: 2553: 2519: 2443: 2438: 2408: 2403: 2375: 2347: 2328:Canaan Creative 2298:(not exchanges) 2296: 2290: 2263: 2223: 2202: 2177: 2123:Bitcoin network 2111: 2080: 2031:Vitalik Buterin 1981:Brian Armstrong 1959: 1931: 1926: 1874:Wayback Machine 1870:Finney's system 1866: 1861: 1852: 1850: 1835: 1831: 1822: 1820: 1805: 1801: 1746: 1742: 1733: 1731: 1696: 1692: 1686:Wayback Machine 1677: 1673: 1663: 1661: 1650: 1646: 1640:Wayback Machine 1631: 1627: 1621:Wayback Machine 1612: 1608: 1598: 1596: 1581: 1577: 1567: 1565: 1556: 1555: 1551: 1542: 1540: 1527: 1526: 1522: 1512: 1510: 1506: 1495: 1489: 1485: 1476: 1474: 1459: 1455: 1446: 1444: 1440: 1429: 1419: 1415: 1404: 1400: 1392: 1353: 1349: 1340: 1338: 1334: 1323: 1317: 1313: 1298: 1294: 1284: 1282: 1271: 1267: 1251: 1250: 1238: 1219:10.1.1.597.6304 1206: 1199: 1190: 1188: 1184: 1178: 1155: 1149: 1142: 1133: 1131: 1116: 1109: 1102: 1067: 1060: 1048: 1046: 1037: 1036: 1021: 1014: 1006: 1002: 993: 991: 980: 976: 965: 958: 950: 944: 940: 930: 928: 907: 903: 894: 892: 879: 878: 874: 865: 863: 850: 849: 842: 829: 827: 823: 810: 806: 805: 798: 789: 787: 774: 773: 769: 760: 758: 745: 744: 740: 731: 729: 722: 687: 676: 651: 644: 599: 595: 591: 579: 571: 514: 475: 469: 445: 432: 403: 382: 357: 289: 195: 182: 175: 168: 157: 130: 26:) is a form of 17: 12: 11: 5: 4655: 4645: 4644: 4639: 4634: 4619: 4618: 4606: 4594: 4571: 4570: 4567: 4566: 4564: 4563: 4552: 4549: 4548: 4546: 4545: 4540: 4538:Random numbers 4535: 4530: 4525: 4520: 4515: 4510: 4505: 4500: 4495: 4490: 4484: 4482: 4478: 4477: 4475: 4474: 4469: 4464: 4462:Garlic routing 4459: 4454: 4449: 4444: 4439: 4434: 4429: 4424: 4419: 4414: 4409: 4404: 4399: 4394: 4389: 4384: 4382:Secure channel 4379: 4373: 4372: 4371: 4360: 4355: 4350: 4345: 4343:Key stretching 4340: 4335: 4330: 4325: 4320: 4315: 4310: 4309: 4308: 4303: 4293: 4291:Cryptovirology 4288: 4283: 4278: 4276:Cryptocurrency 4273: 4268: 4263: 4262: 4261: 4251: 4246: 4240: 4238: 4234: 4233: 4226: 4225: 4218: 4211: 4203: 4196: 4195: 4192: 4191: 4188: 4187: 4185: 4184: 4179: 4174: 4169: 4164: 4159: 4153: 4151: 4147: 4146: 4144: 4143: 4138: 4133: 4128: 4123: 4118: 4113: 4107: 4105: 4101: 4100: 4098: 4097: 4092: 4087: 4082: 4080:Hash collision 4077: 4071: 4069: 4065: 4064: 4062: 4061: 4056: 4051: 4046: 4041: 4036: 4031: 4025: 4023: 4019: 4018: 4016: 4015: 4010: 4005: 4000: 3995: 3990: 3985: 3979: 3977: 3968: 3967: 3965: 3964: 3959: 3954: 3949: 3944: 3939: 3930: 3925: 3920: 3915: 3910: 3904: 3902: 3896: 3895: 3893: 3892: 3889: 3883: 3881: 3873: 3872: 3870: 3869: 3864: 3859: 3854: 3849: 3844: 3839: 3834: 3829: 3824: 3819: 3813: 3811: 3808:key stretching 3802: 3801: 3799: 3798: 3793: 3788: 3783: 3778: 3773: 3768: 3763: 3758: 3753: 3748: 3743: 3738: 3733: 3728: 3723: 3718: 3713: 3708: 3703: 3698: 3693: 3688: 3683: 3678: 3673: 3668: 3663: 3658: 3652: 3650: 3646: 3645: 3643: 3642: 3636: 3631: 3626: 3621: 3615: 3613: 3607: 3606: 3604: 3603: 3598: 3593: 3588: 3582: 3575: 3573: 3569: 3568: 3566: 3565: 3560: 3555: 3549: 3546: 3545: 3534: 3533: 3526: 3519: 3511: 3494: 3493: 3491: 3490: 3478: 3466: 3453: 3450: 3449: 3447: 3446: 3441: 3436: 3431: 3426: 3421: 3416: 3411: 3406: 3401: 3396: 3391: 3386: 3381: 3376: 3371: 3366: 3361: 3356: 3350: 3348: 3347:Related topics 3344: 3343: 3341: 3340: 3335: 3330: 3324: 3322: 3318: 3317: 3314: 3313: 3311: 3310: 3305: 3300: 3295: 3290: 3289: 3288: 3278: 3272: 3270: 3263: 3262: 3257: 3252: 3247: 3242: 3237: 3232: 3227: 3222: 3217: 3212: 3207: 3202: 3197: 3192: 3187: 3182: 3177: 3172: 3167: 3162: 3157: 3152: 3147: 3142: 3137: 3132: 3127: 3122: 3116: 3114: 3108: 3107: 3105: 3104: 3099: 3094: 3089: 3084: 3078: 3076: 3070: 3069: 3067: 3066: 3061: 3056: 3051: 3046: 3041: 3036: 3031: 3026: 3021: 3016: 3011: 3005: 3003: 2999: 2998: 2996: 2995: 2990: 2985: 2980: 2975: 2970: 2964: 2962: 2956: 2955: 2953: 2952: 2947: 2942: 2937: 2932: 2927: 2922: 2917: 2912: 2907: 2902: 2896: 2894: 2887: 2886: 2884: 2883: 2878: 2873: 2868: 2863: 2858: 2853: 2848: 2843: 2838: 2833: 2827: 2822: 2817: 2812: 2806: 2804: 2801:Proof of stake 2797: 2796: 2793: 2792: 2790: 2789: 2784: 2779: 2774: 2772:Nervos Network 2769: 2764: 2759: 2753: 2751: 2747: 2746: 2744: 2743: 2738: 2732: 2730: 2723: 2722: 2720: 2719: 2713: 2711: 2707: 2706: 2704: 2703: 2698: 2692: 2690: 2683: 2682: 2680: 2679: 2674: 2669: 2664: 2659: 2653: 2651: 2644: 2643: 2641: 2640: 2635: 2628: 2626: 2619: 2618: 2616: 2615: 2610: 2605: 2600: 2595: 2590: 2585: 2580: 2574: 2572: 2562: 2555: 2554: 2552: 2551: 2546: 2544:Proof of stake 2541: 2539:Proof of space 2536: 2530: 2528: 2521: 2520: 2518: 2517: 2512: 2510:Smart contract 2507: 2502: 2497: 2492: 2487: 2482: 2477: 2472: 2467: 2462: 2457: 2451: 2449: 2445: 2444: 2437: 2436: 2429: 2422: 2414: 2405: 2404: 2402: 2401: 2391: 2380: 2377: 2376: 2374: 2373: 2368: 2363: 2357: 2355: 2349: 2348: 2346: 2345: 2340: 2335: 2330: 2325: 2320: 2315: 2308: 2302: 2300: 2295:Legal entities 2292: 2291: 2289: 2288: 2280: 2271: 2269: 2265: 2264: 2262: 2261: 2256: 2251: 2246: 2241: 2235: 2233: 2229: 2228: 2225: 2224: 2222: 2221: 2216: 2210: 2208: 2204: 2203: 2201: 2200: 2194: 2192: 2185: 2179: 2178: 2176: 2175: 2170: 2165: 2160: 2155: 2150: 2145: 2140: 2135: 2133:Cryptocurrency 2130: 2125: 2119: 2117: 2113: 2112: 2110: 2109: 2104: 2099: 2094: 2088: 2086: 2082: 2081: 2079: 2078: 2073: 2068: 2063: 2058: 2053: 2048: 2043: 2038: 2033: 2028: 2023: 2018: 2013: 2008: 2003: 1998: 1993: 1991:Wences Casares 1988: 1983: 1978: 1973: 1971:Gavin Andresen 1967: 1965: 1961: 1960: 1958: 1957: 1952: 1947: 1942: 1936: 1933: 1932: 1925: 1924: 1917: 1910: 1902: 1896: 1895: 1889: 1877: 1865: 1864:External links 1862: 1860: 1859: 1829: 1799: 1740: 1690: 1671: 1644: 1625: 1606: 1575: 1549: 1520: 1483: 1453: 1413: 1398: 1390: 1360:Malkhi, Dahlia 1347: 1311: 1292: 1265: 1236: 1197: 1176: 1140: 1107: 1100: 1070:Dwork, Cynthia 1058: 1049:|journal= 1012: 1000: 974: 956: 938: 921:Bloomberg News 901: 872: 840: 796: 767: 738: 720: 690:Dwork, Cynthia 674: 642: 613:(2): 126–129. 592: 590: 587: 586: 585: 570: 567: 566: 565: 560: 555: 553:Proof of stake 550: 548:Proof of space 545: 540: 535: 530: 528:Cryptocurrency 525: 520: 513: 510: 490:proof of stake 468: 465: 444: 441: 431: 428: 402: 399: 381: 378: 356: 353: 352: 351: 346: 340: 337: 334: 331: 328: 325:Diffie-Hellman 322: 319: 318:Hash sequences 316: 309: 306: 299: 288: 285: 276: 275: 268: 262: 227: 226: 207: 206: 194: 191: 180: 163: 129: 126: 83:proof of stake 15: 9: 6: 4: 3: 2: 4654: 4643: 4640: 4638: 4635: 4633: 4630: 4629: 4627: 4617: 4607: 4605: 4600: 4595: 4593: 4583: 4582: 4579: 4562: 4554: 4553: 4550: 4544: 4543:Steganography 4541: 4539: 4536: 4534: 4531: 4529: 4526: 4524: 4521: 4519: 4516: 4514: 4511: 4509: 4506: 4504: 4501: 4499: 4498:Stream cipher 4496: 4494: 4491: 4489: 4486: 4485: 4483: 4479: 4473: 4470: 4468: 4465: 4463: 4460: 4458: 4457:Onion routing 4455: 4453: 4450: 4448: 4445: 4443: 4440: 4438: 4437:Shared secret 4435: 4433: 4430: 4428: 4425: 4423: 4420: 4418: 4415: 4413: 4410: 4408: 4405: 4403: 4400: 4398: 4395: 4393: 4390: 4388: 4385: 4383: 4380: 4377: 4374: 4369: 4366: 4365: 4364: 4361: 4359: 4356: 4354: 4351: 4349: 4346: 4344: 4341: 4339: 4336: 4334: 4333:Key generator 4331: 4329: 4326: 4324: 4321: 4319: 4316: 4314: 4311: 4307: 4304: 4302: 4299: 4298: 4297: 4296:Hash function 4294: 4292: 4289: 4287: 4284: 4282: 4279: 4277: 4274: 4272: 4271:Cryptanalysis 4269: 4267: 4264: 4260: 4257: 4256: 4255: 4252: 4250: 4247: 4245: 4242: 4241: 4239: 4235: 4231: 4224: 4219: 4217: 4212: 4210: 4205: 4204: 4201: 4197: 4183: 4180: 4178: 4175: 4173: 4172:Proof of work 4170: 4168: 4165: 4163: 4160: 4158: 4155: 4154: 4152: 4148: 4142: 4139: 4137: 4134: 4132: 4129: 4127: 4124: 4122: 4119: 4117: 4114: 4112: 4109: 4108: 4106: 4102: 4096: 4093: 4091: 4088: 4086: 4083: 4081: 4078: 4076: 4073: 4072: 4070: 4066: 4060: 4057: 4055: 4052: 4050: 4049:Rainbow table 4047: 4045: 4042: 4040: 4037: 4035: 4032: 4030: 4027: 4026: 4024: 4020: 4014: 4011: 4009: 4006: 4004: 4001: 3999: 3996: 3994: 3991: 3989: 3986: 3984: 3981: 3980: 3978: 3975: 3972:Authenticated 3969: 3963: 3960: 3958: 3955: 3953: 3950: 3948: 3945: 3943: 3940: 3938: 3934: 3931: 3929: 3926: 3924: 3921: 3919: 3916: 3914: 3911: 3909: 3906: 3905: 3903: 3901: 3900:MAC functions 3897: 3890: 3888: 3885: 3884: 3882: 3880: 3874: 3868: 3865: 3863: 3860: 3858: 3855: 3853: 3850: 3848: 3845: 3843: 3840: 3838: 3835: 3833: 3830: 3828: 3825: 3823: 3820: 3818: 3815: 3814: 3812: 3809: 3803: 3797: 3794: 3792: 3789: 3787: 3784: 3782: 3779: 3777: 3774: 3772: 3769: 3767: 3764: 3762: 3759: 3757: 3754: 3752: 3749: 3747: 3744: 3742: 3739: 3737: 3734: 3732: 3729: 3727: 3724: 3722: 3719: 3717: 3714: 3712: 3709: 3707: 3704: 3702: 3699: 3697: 3694: 3692: 3689: 3687: 3684: 3682: 3679: 3677: 3674: 3672: 3669: 3667: 3664: 3662: 3659: 3657: 3654: 3653: 3651: 3647: 3640: 3637: 3635: 3632: 3630: 3627: 3625: 3622: 3620: 3617: 3616: 3614: 3612: 3608: 3602: 3599: 3597: 3594: 3592: 3589: 3587:(compromised) 3586: 3583: 3581:(compromised) 3580: 3577: 3576: 3574: 3570: 3564: 3563:Known attacks 3561: 3559: 3556: 3554: 3551: 3550: 3547: 3543: 3539: 3532: 3527: 3525: 3520: 3518: 3513: 3512: 3509: 3505: 3501: 3489: 3488: 3479: 3477: 3476: 3467: 3465: 3464: 3455: 3454: 3451: 3445: 3442: 3440: 3437: 3435: 3432: 3430: 3427: 3425: 3422: 3420: 3417: 3415: 3412: 3410: 3407: 3405: 3402: 3400: 3397: 3395: 3392: 3390: 3387: 3385: 3382: 3380: 3377: 3375: 3372: 3370: 3367: 3365: 3362: 3360: 3357: 3355: 3352: 3351: 3349: 3345: 3339: 3336: 3334: 3331: 3329: 3326: 3325: 3323: 3319: 3309: 3306: 3304: 3301: 3299: 3296: 3294: 3293:LocalBitcoins 3291: 3287: 3284: 3283: 3282: 3279: 3277: 3274: 3273: 3271: 3267: 3261: 3258: 3256: 3253: 3251: 3248: 3246: 3243: 3241: 3238: 3236: 3233: 3231: 3228: 3226: 3225:ItBit (Paxos) 3223: 3221: 3218: 3216: 3213: 3211: 3208: 3206: 3203: 3201: 3198: 3196: 3193: 3191: 3188: 3186: 3183: 3181: 3178: 3176: 3173: 3171: 3168: 3166: 3163: 3161: 3158: 3156: 3153: 3151: 3148: 3146: 3143: 3141: 3138: 3136: 3133: 3131: 3128: 3126: 3123: 3121: 3118: 3117: 3115: 3113: 3109: 3103: 3100: 3098: 3095: 3093: 3090: 3088: 3085: 3083: 3080: 3079: 3077: 3075: 3071: 3065: 3062: 3060: 3057: 3055: 3052: 3050: 3047: 3045: 3042: 3040: 3037: 3035: 3032: 3030: 3027: 3025: 3022: 3020: 3017: 3015: 3012: 3010: 3007: 3006: 3004: 3000: 2994: 2991: 2989: 2986: 2984: 2981: 2979: 2976: 2974: 2971: 2969: 2966: 2965: 2963: 2961: 2957: 2951: 2948: 2946: 2943: 2941: 2938: 2936: 2933: 2931: 2928: 2926: 2923: 2921: 2918: 2916: 2913: 2911: 2908: 2906: 2903: 2901: 2898: 2897: 2895: 2892: 2888: 2882: 2879: 2877: 2874: 2872: 2869: 2867: 2864: 2862: 2859: 2857: 2854: 2852: 2849: 2847: 2844: 2842: 2839: 2837: 2834: 2831: 2828: 2826: 2823: 2821: 2818: 2816: 2813: 2811: 2808: 2807: 2805: 2802: 2798: 2788: 2785: 2783: 2780: 2778: 2775: 2773: 2770: 2768: 2765: 2763: 2760: 2758: 2755: 2754: 2752: 2748: 2742: 2739: 2737: 2734: 2733: 2731: 2728: 2724: 2718: 2715: 2714: 2712: 2710:RandomX-based 2708: 2702: 2699: 2697: 2694: 2693: 2691: 2688: 2684: 2678: 2675: 2673: 2670: 2668: 2665: 2663: 2660: 2658: 2655: 2654: 2652: 2649: 2645: 2639: 2636: 2633: 2630: 2629: 2627: 2624: 2620: 2614: 2611: 2609: 2606: 2604: 2601: 2599: 2596: 2594: 2591: 2589: 2586: 2584: 2581: 2579: 2576: 2575: 2573: 2570: 2566: 2563: 2560: 2559:Proof of work 2556: 2550: 2549:Proof of work 2547: 2545: 2542: 2540: 2537: 2535: 2532: 2531: 2529: 2526: 2522: 2516: 2513: 2511: 2508: 2506: 2503: 2501: 2498: 2496: 2493: 2491: 2488: 2486: 2483: 2481: 2478: 2476: 2473: 2471: 2468: 2466: 2463: 2461: 2458: 2456: 2453: 2452: 2450: 2446: 2442: 2435: 2430: 2428: 2423: 2421: 2416: 2415: 2412: 2400: 2392: 2390: 2382: 2381: 2378: 2372: 2369: 2367: 2366:Bitcoin Beach 2364: 2362: 2359: 2358: 2356: 2354: 2350: 2344: 2341: 2339: 2336: 2334: 2331: 2329: 2326: 2324: 2321: 2319: 2316: 2314: 2313: 2309: 2307: 2304: 2303: 2301: 2293: 2286: 2285: 2281: 2278: 2277: 2273: 2272: 2270: 2266: 2260: 2257: 2255: 2252: 2250: 2247: 2245: 2242: 2240: 2237: 2236: 2234: 2230: 2220: 2217: 2215: 2212: 2211: 2209: 2205: 2199: 2196: 2195: 2193: 2189: 2186: 2184: 2180: 2174: 2171: 2169: 2166: 2164: 2163:Proof of work 2161: 2159: 2156: 2154: 2151: 2149: 2146: 2144: 2141: 2139: 2136: 2134: 2131: 2129: 2126: 2124: 2121: 2120: 2118: 2114: 2108: 2105: 2103: 2100: 2098: 2095: 2093: 2090: 2089: 2087: 2083: 2077: 2076:Erik Voorhees 2074: 2072: 2069: 2067: 2064: 2062: 2059: 2057: 2054: 2052: 2049: 2047: 2044: 2042: 2039: 2037: 2036:Ross Ulbricht 2034: 2032: 2029: 2027: 2024: 2022: 2021:Charlie Shrem 2019: 2017: 2014: 2012: 2011:Mark Karpelès 2009: 2007: 2004: 2002: 1999: 1997: 1994: 1992: 1989: 1987: 1984: 1982: 1979: 1977: 1974: 1972: 1969: 1968: 1966: 1962: 1956: 1953: 1951: 1948: 1946: 1943: 1941: 1938: 1937: 1934: 1930: 1923: 1918: 1916: 1911: 1909: 1904: 1903: 1900: 1893: 1890: 1888: 1884: 1881: 1878: 1875: 1871: 1868: 1867: 1848: 1844: 1840: 1833: 1818: 1814: 1810: 1803: 1795: 1791: 1787: 1783: 1778: 1773: 1768: 1763: 1759: 1755: 1751: 1744: 1729: 1725: 1721: 1717: 1713: 1709: 1705: 1701: 1694: 1687: 1683: 1680: 1675: 1659: 1655: 1648: 1641: 1637: 1634: 1629: 1622: 1618: 1615: 1610: 1594: 1590: 1586: 1579: 1563: 1559: 1553: 1538: 1534: 1533:www.cbeci.org 1530: 1524: 1505: 1501: 1494: 1487: 1472: 1468: 1464: 1457: 1439: 1435: 1428: 1424: 1417: 1409: 1402: 1393: 1387: 1383: 1379: 1375: 1371: 1366: 1361: 1357: 1351: 1337:on 2016-03-03 1333: 1329: 1322: 1315: 1307: 1303: 1296: 1280: 1276: 1269: 1261: 1255: 1247: 1243: 1239: 1233: 1229: 1225: 1220: 1215: 1211: 1204: 1202: 1183: 1179: 1173: 1169: 1165: 1161: 1154: 1147: 1145: 1129: 1125: 1121: 1114: 1112: 1103: 1097: 1092: 1087: 1083: 1079: 1075: 1071: 1065: 1063: 1054: 1041: 1034:(2): 299–327. 1033: 1029: 1025: 1024:Abadi, MartĂ­n 1019: 1017: 1009: 1004: 989: 985: 978: 970: 963: 961: 949: 942: 926: 922: 918: 917: 912: 905: 890: 886: 885:Bloomberg.com 882: 876: 861: 857: 853: 847: 845: 837: 822: 819:. July 2018. 818: 817: 809: 803: 801: 785: 781: 777: 771: 756: 752: 748: 742: 727: 723: 717: 712: 707: 703: 699: 695: 691: 685: 683: 681: 679: 669: 664: 660: 656: 649: 647: 638: 634: 630: 626: 621: 616: 612: 608: 604: 597: 593: 582: 576: 573: 572: 564: 561: 559: 556: 554: 551: 549: 546: 544: 541: 539: 538:Proof of burn 536: 534: 531: 529: 526: 524: 521: 519: 516: 515: 509: 506: 505:grandfathered 502: 498: 493: 491: 487: 482: 480: 474: 464: 462: 456: 454: 450: 440: 438: 427: 425: 421: 416: 407: 398: 396: 391: 387: 384:In 2009, the 377: 375: 371: 366: 362: 350: 347: 344: 341: 338: 335: 332: 329: 327:–based puzzle 326: 323: 320: 317: 314: 310: 307: 304: 300: 298:a large prime 297: 294: 293: 292: 284: 281: 272: 271:Network-bound 269: 266: 263: 260: 256: 253: 252: 251: 248: 245: 243: 239: 231: 224: 219: 216: 215: 211: 203: 200: 199: 198: 190: 188: 179: 173: 166: 162: 159: 155: 150: 148: 142: 139: 135: 125: 122: 118: 113: 111: 107: 103: 102:client puzzle 99: 94: 92: 88: 84: 79: 75: 70: 68: 64: 60: 56: 52: 51:Cynthia Dwork 48: 44: 40: 36: 32: 29: 28:cryptographic 25: 21: 20:Proof of work 4632:Cryptography 4493:Block cipher 4338:Key schedule 4328:Key exchange 4318:Kleptography 4281:Cryptosystem 4230:Cryptography 4171: 3485: 3473: 3461: 3338:Initiative Q 2696:Bitcoin Gold 2588:Counterparty 2583:Bitcoin Cash 2558: 2548: 2371:Bitcoin City 2310: 2282: 2274: 2219:Bitcoin Gold 2214:Bitcoin Cash 2162: 2116:Technologies 2066:Dave Kleiman 2061:Craig Wright 1950:Legal status 1886: 1851:. Retrieved 1842: 1832: 1821:. Retrieved 1812: 1802: 1777:10419/251105 1757: 1753: 1743: 1732:. Retrieved 1710:(3): 65–77. 1707: 1703: 1693: 1674: 1662:. Retrieved 1647: 1628: 1609: 1597:. Retrieved 1588: 1578: 1568:30 September 1566:. Retrieved 1552: 1541:. Retrieved 1532: 1523: 1511:. Retrieved 1499: 1486: 1475:. Retrieved 1466: 1456: 1445:. Retrieved 1433: 1416: 1407: 1401: 1369: 1350: 1339:. Retrieved 1332:the original 1327: 1314: 1305: 1295: 1283:. Retrieved 1273:Back, Adam. 1268: 1209: 1189:. Retrieved 1159: 1132:. Retrieved 1123: 1081: 1040:cite journal 1031: 1003: 992:. Retrieved 977: 968: 941: 929:. Retrieved 914: 904: 893:. Retrieved 884: 875: 864:. Retrieved 855: 835: 828:. Retrieved 814: 788:. Retrieved 780:Investopedia 779: 770: 759:. Retrieved 750: 741: 730:. Retrieved 701: 658: 610: 606: 596: 575: 494: 483: 476: 457: 449:mining pools 446: 433: 415:Peer-to-peer 412: 383: 358: 339:Cuckoo Cycle 290: 279: 277: 270: 265:Memory-bound 264: 254: 249: 246: 235: 217: 201: 196: 183: 169: 151: 143: 131: 114: 97: 95: 71: 38: 34: 23: 19: 18: 4616:Numismatics 4481:Mathematics 4472:Mix network 4162:Merkle tree 4150:Utilization 4136:NSA Suite B 3439:Token money 3328:Hyperledger 3200:EDX Markets 3064:WhopperCoin 2960:Stablecoins 2361:Bitcoin Law 2287:(2015 film) 2279:(2014 film) 2143:Bitcoin ATM 2046:Cody Wilson 1513:9 September 424:Switzerland 343:Merkle tree 303:Fiat–Shamir 176:X-Hashcash: 4626:Categories 4432:Ciphertext 4402:Decryption 4397:Encryption 4358:Ransomware 3974:encryption 3751:RadioGatĂşn 3558:Comparison 3359:BitLicense 3303:QuadrigaCX 3286:bankruptcy 3250:ShapeShift 3195:Crypto.com 3082:BitConnect 3034:MobileCoin 2803:currencies 2662:Bitconnect 2657:Auroracoin 2561:currencies 2527:mechanisms 2455:Blockchain 2448:Technology 2128:Blockchain 2026:Nick Szabo 2001:Hal Finney 1996:Tim Draper 1853:2022-12-04 1823:2022-01-22 1734:2020-10-28 1664:28 October 1589:Money Beat 1543:2020-02-20 1477:2007-11-25 1447:2019-08-06 1341:2013-04-15 1285:2005-03-02 1275:"HashCash" 1191:2015-09-30 1134:2007-11-04 1078:Naor, Moni 994:2015-12-29 931:13 January 895:2023-04-01 866:2023-04-01 830:29 October 790:2024-01-17 761:2024-01-17 732:2012-09-10 694:Naor, Moni 589:References 523:Bitmessage 471:See also: 461:51% attack 437:51% attack 395:block time 305:signatures 128:Background 117:algorithms 67:Hal Finney 4422:Plaintext 3891:KDF1/KDF2 3810:functions 3796:Whirlpool 3190:Coincheck 3092:KodakCoin 2940:Shiba Inu 2925:KodakCoin 2915:Chainlink 2841:Injective 2815:Avalanche 2777:Primecoin 2525:Consensus 2041:Roger Ver 1986:Adam Back 1945:Economics 1794:231942439 1786:0003-6846 1724:211422987 1688:on Github 1254:cite book 1214:CiteSeerX 637:222070383 629:1556-6056 255:CPU-bound 138:Adam Back 106:incentive 78:consensus 47:Moni Naor 39:verifiers 4604:Internet 4561:Category 4467:Kademlia 4427:Codetext 4370:(CSPRNG) 4116:CRYPTREC 3947:Poly1305 3867:yescrypt 3781:Streebog 3661:CubeHash 3641:(winner) 3463:Category 3185:Coinbase 3165:Bitstamp 3145:Bitpanda 3135:bitFlyer 3130:Bitfinex 3054:SafeMoon 3014:Filecoin 2993:USD Coin 2861:Polkadot 2856:Peercoin 2836:Gridcoin 2830:Ethereum 2810:Algorand 2787:Vertcoin 2757:AmbaCoin 2687:Equihash 2677:Litecoin 2672:Dogecoin 2632:Ethereum 2608:Peercoin 2603:Namecoin 2598:MazaCoin 2500:MetaMask 2389:Category 2338:GHash.io 2333:CoinDesk 2284:Deep Web 2207:Currency 2071:Jihan Wu 1883:Bit gold 1880:bit gold 1847:Archived 1817:Archived 1813:euronews 1728:Archived 1682:Archived 1658:Archived 1636:Archived 1617:Archived 1593:Archived 1562:Archived 1537:Archived 1504:Archived 1471:Archived 1438:Archived 1425:(2004). 1362:(1997). 1279:Archived 1246:14434713 1182:Archived 1128:Archived 988:Archived 925:Archived 889:Archived 860:Archived 821:Archived 784:Archived 755:Archived 726:Archived 696:(1993). 512:See also 497:New York 390:Hashcash 336:Hokkaido 330:Moderate 280:shortcut 223:Hashcash 193:Variants 147:spamming 134:Hashcash 43:Hashcash 4578:Portals 4237:General 4022:Attacks 3952:SipHash 3908:CBC-MAC 3842:LM hash 3822:Balloon 3686:HAS-160 3475:Commons 3354:Airdrop 3333:IQ.Wiki 3298:Mt. Gox 3269:Defunct 3255:Uniswap 3215:Genesis 3150:Bithumb 3125:Binance 3097:OneCoin 3059:Stellar 2945:The DAO 2935:Polygon 2905:Aventus 2820:Cardano 2613:Titcoin 2578:Bitcoin 2569:SHA-256 2399:Commons 2323:Bitmain 2232:History 2006:Wei Dai 1940:History 1929:Bitcoin 1872:at the 1599:30 June 1408:NDSS 99 1374:151–160 518:Bitcoin 386:Bitcoin 374:WalkSAT 359:At the 321:Puzzles 301:Weaken 274:tokens. 187:bitcoin 74:Bitcoin 4348:Keygen 4182:Pepper 4121:NESSIE 4068:Design 3862:scrypt 3857:PBKDF2 3832:Catena 3827:bcrypt 3817:Argon2 3776:Snefru 3771:Shabal 3766:SWIFFT 3746:RIPEMD 3741:N-hash 3716:MASH-2 3711:MASH-1 3696:Kupyna 3656:BLAKE3 3639:Keccak 3624:Grøstl 3601:BLAKE2 3308:Thodex 3235:Kucoin 3230:Kraken 3210:Gemini 3180:Circle 3155:BitMEX 3140:Bitkub 3087:Coinye 3049:Ripple 3024:Helium 2988:Tether 2893:tokens 2891:ERC-20 2866:Solana 2825:EOS.IO 2729:-based 2717:Monero 2689:-based 2667:Coinye 2650:-based 2648:Scrypt 2625:-based 2623:Ethash 2571:-based 2268:Movies 2191:Client 2168:SegWit 1964:People 1792:  1784:  1722:  1388:  1244:  1234:  1216:  1174:  1098:  718:  635:  627:  345:–based 333:Mbound 154:e-mail 35:prover 4378:(PRN) 3976:modes 3852:Makwa 3847:Lyra2 3837:crypt 3786:Tiger 3736:MDC-2 3691:HAVAL 3676:Fugue 3634:Skein 3619:BLAKE 3596:SHA-3 3591:SHA-2 3585:SHA-1 3276:BTC-e 3260:Upbit 3220:Huobi 3205:eToro 3160:Bitso 3102:Petro 2983:Terra 2930:Minds 2900:Augur 2876:Tezos 2871:Steem 2832:(2.0) 2782:Verge 2750:Other 2741:Petro 2701:Zcash 2634:(1.0) 2318:BitGo 2183:Forks 2173:SHA-2 2148:ECDSA 2085:Lists 1790:S2CID 1720:S2CID 1507:(PDF) 1496:(PDF) 1441:(PDF) 1430:(PDF) 1335:(PDF) 1324:(PDF) 1242:S2CID 1185:(PDF) 1156:(PDF) 951:(PDF) 824:(PDF) 811:(PDF) 633:S2CID 569:Notes 172:SHA-1 110:value 31:proof 4177:Salt 4141:CNSA 4008:IAPM 3962:VMAC 3957:UMAC 3942:PMAC 3937:CMAC 3933:OMAC 3928:NMAC 3923:HMAC 3918:GMAC 3887:HKDF 3756:SIMD 3706:Lane 3681:GOST 3666:ECOH 3553:List 3540:and 3487:List 3240:Kuna 3170:BTCC 3120:Abra 3039:Nano 3029:Luna 3009:Chia 2973:Diem 2950:TRON 2767:IOTA 2762:Firo 2736:Dash 2593:LBRY 2515:Web3 2490:Fork 2343:Nuri 1843:CNBC 1782:ISSN 1666:2020 1601:2014 1570:2020 1515:2022 1386:ISBN 1260:link 1232:ISBN 1172:ISBN 1096:ISBN 1053:help 933:2022 832:2020 716:ISBN 625:ISSN 361:IACR 121:work 98:work 59:spam 49:and 4013:OCB 4003:GCM 3998:EAX 3993:CWC 3983:CCM 3913:DAA 3791:VSH 3761:SM3 3731:MD6 3726:MD4 3721:MD2 3701:LSH 3671:FSB 3579:MD5 3281:FTX 3245:OKX 3175:BUX 3044:NEO 2978:Pax 2968:Dai 2920:Kin 2881:TON 2851:Nxt 2846:Kin 2727:X11 2158:P2P 1772:hdl 1762:doi 1712:doi 1378:doi 1224:doi 1164:doi 1086:doi 706:doi 663:doi 615:doi 45:by 24:PoW 4628:: 3629:JH 1885:. 1845:. 1841:. 1815:. 1811:. 1788:. 1780:. 1770:. 1758:53 1756:. 1752:. 1726:. 1718:. 1708:22 1706:. 1702:. 1656:. 1587:. 1535:. 1531:. 1502:. 1498:. 1469:. 1465:. 1436:. 1432:. 1384:. 1376:. 1368:. 1358:; 1326:. 1304:. 1277:. 1256:}} 1252:{{ 1240:. 1230:. 1222:. 1200:^ 1180:. 1170:. 1158:. 1143:^ 1126:. 1122:. 1110:^ 1094:. 1076:; 1072:; 1061:^ 1044:: 1042:}} 1038:{{ 1030:. 1015:^ 986:. 959:^ 923:. 919:. 913:. 887:. 883:. 858:. 854:. 843:^ 834:. 813:. 799:^ 782:. 778:. 753:. 749:. 724:. 714:. 700:. 692:; 677:^ 657:. 645:^ 631:. 623:. 611:19 609:. 605:. 439:. 426:. 4580:: 4222:e 4215:t 4208:v 3935:/ 3530:e 3523:t 3516:v 2433:e 2426:t 2419:v 1921:e 1914:t 1907:v 1856:. 1826:. 1796:. 1774:: 1764:: 1737:. 1714:: 1668:. 1603:. 1572:. 1546:. 1517:. 1480:. 1450:. 1410:. 1394:. 1380:: 1344:. 1308:. 1288:. 1262:) 1248:. 1226:: 1194:. 1166:: 1137:. 1104:. 1088:: 1055:) 1051:( 1032:5 997:. 971:. 953:. 935:. 898:. 869:. 793:. 764:. 735:. 708:: 671:. 665:: 639:. 617:: 225:. 81:( 22:(

Index

cryptographic
proof
Hashcash
Moni Naor
Cynthia Dwork
denial-of-service attacks
spam
Markus Jakobsson
Hal Finney
Bitcoin
consensus
proof of stake
Sybil deterrence mechanisms
cryptocurrencies
client puzzle
incentive
value
algorithms
work
Hashcash
Adam Back
spamming
e-mail


SHA-1
bitcoin

Hashcash

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑