Proof of Useful Work - Internet Computer Wiki (2024)

Contents

  • 1 Background
  • 2 Proof of useful work
  • 3 Useful historical resources
  • 4 See also

Background

When Satoshi designed Bitcoin, he wrestled with two primary problems. Firstly, he needed to find a way to prevent what is known as a "Sybil attack", which would allow an adversary (i.e. the bad guys) to add additional nodes to the decentralized network, until they could take control. Secondly, he needed to find a way to bring the network to consensus regarding changes to the ledger (i.e. what transactions were processed, and in which order).

His solution was proof-of-work (now sometimes shortened to PoW). Although often described as a decentralized consensus protocol, it is both a decentralized Sybil-resistance scheme, and a consensus protocol. In order to participate in "mining" bitcoin, it is necessary for miners to run special hardware that creates large numbers of cryptographic hashes of blocks they wish to propose, until a "winning" hash is found, whereupon they can submit the block to the network. In practice, the relative number of blocks that each miner produces, and the rewards they earn, is proportional to the amount of hashes that their hardware can perform.

Proof-of-work solves the Sybil problem because vast volumes of hashes have to be calculated to have a chance of producing a block, which involves the dedication of expensive mining hardware, and copious amounts of electricity. As participation in the Bitcoin network grew, it quickly became too expensive for any adversary to acquire and run sufficient hashing hardware that they could perform a large enough share of the network's hashing that they might gain control (for example to double-spend). By fortune, the Sybil-resistance scheme also helped solved consensus, since hashes are random numbers, and winning hashes are discovered randomly only through brute force, and thus a random miner is assigned the job of creating each block.

A great advantage of proof-of-work is that it results in a chain that is produced by relatively stable, dedicated hardware, creating a secure network. Essentially, the Bitcoin network that produces blocks can be thought of as a giant decentralized hashing factory. However, the downside is that the scheme essentially works as a hashing competition, in which the total money miners spend on hashing hardware, and the large amounts of electricity necessary to keep it running, tends towards the value of the block rewards that Bitcoin provides. Moreover, the scheme does not reach consensus quickly.

As a result of the expense, the blockchain industry worked on proof-of-stake (often shortened to PoS) schemes, in which individual network nodes would be joined to the network by staking ("locking") some amount of cryptocurrency, then producing blocks, and earning rewards, in proportion to the amount of cryptocurrency that they have staked. This replaced the expense of the dedicated hashing hardware, and the electricity used to run it, with the cost of capital involved in staking. Ethereum 2.0 migrated the network from a PoW architecture to a PoS architecture. Not only did this allow the network to run much faster, because it could use alternative consensus schemes, but it prevented the environmentally-costly expenditure of electricity to power the hashing hardware.

However, PoS has numerous challenges, which are becoming increasingly apparent. Firstly, once the need for dedicated hardware was removed, a block-producing network node (or "client") could simply be spun up anywhere, including the corporate cloud, and activated just by staking some cryptocurrency. As a result, the vast majority of nodes on PoS networks, run in the cloud. The dangers of running a blockchain in the cloud were recently brought into sharp relief – the Hetzner cloud, in Europe, recently suddenly banned Solana nodes, immediately causing 40% of its network to disappear in the blink of an eye. A PoS network running in the cloud is very different to a sovereign network, and the potential exists for cloud providers to interfere with nodes, as well as to close them down.

Another challenge with PoS is that cryptocurrency, by its nature, is highly liquid, raising the possibility of swift changes in network architecture and the distribution of power, which is something an attacker can potentially exploit. For example, clever manipulations of DeFi, or the catastrophic hack of an exchange, might provide an attacker with sufficient stake that they can break the network – allowing them to profit after suitably hedging their staked cryptocurrency. PoS networks often provide frameworks that make it easy to spin up new nodes on the cloud in an instant, allowing a suitably financed adversary to launch an attack by running a script.

Proof of useful work

Proof-of-useful-work (PoUW) is the Internet Computer's answer to these kinds of considerations, and is more complex than the foregoing schemes. It involves a blockchain being produced by dedicated hardware called "node machines" that are of very similar, standardized specification. On the Internet Computer, these run highly sophisticated consensus protocols that lean into the power of advanced cryptography, often referred to as Chain Key Crypto. PoUW is concerned with membership in the network.

Naturally, as per PoW, the purchase, hosting and operation of node machine hardware acts as the stake. However, these machines don't do hashing, and simply produce and process blocks of transactions that represent smart contract computations. The reason that combined node machines must be built to the same standardized specification, is that rather than compete to perform hashing, they must try not to "statistically deviate" by producing more or less blocks. In essence, rather than trying to perform more computation, they try to perform the same amount of computation, and can be punished for deviating from the group.

A key ingredient of the scheme is the Network Nervous System (or NNS), a sophisticated permissionless DAO that is integrated with the Internet Computer's protocols. This fully controls the network, configuring it, and upgrading the software run by node machines. Amoung its responsibilities, it combines node machines to create "subnet blockchains," which themselves are combined into a single blockchain using Chain Key Crypto. This achieves two important things. Firstly, expense aside, it is not possible for an adversary simply to add nodes to a subnet blockchain, since the NNS carefully selects nodes by looking at the node provider, the data center the node is installed within, and its geography and jurisdiction, in a scheme of "deterministic decentralization." Secondly, the NNS can remove (or "slash") nodes that statistically deviate.

By applying deterministic decentralization, the NNS creates a highly secure scheme in which the Internet Computer runs on a sovereign network of dedicated hardware, formed from node machines, which machinery can be tightly held to correct behavior in order to continue its participation in block production (through which its owners, the node providers, earn rewards). In PoUW, the repetitive hashing work of PoW, whose purpose relates primarily to network operation, has been replaced by useful smart contract computation. Since this is work that must be performed anyway, a supremely efficient network is produced.

Useful historical resources

Project founder Dominic Williams was an early pioneer in the study of crypto Sybil resistance and consensus. Here in May 2015 he gives a talk discussing Sybil resistance and consensus at San Francisco Bitcoin Devs, in which he discusses the "3 E's of Sybil Resistance." Other interesting historical material that provides insights into the development of PoUW, include a panel on scalability with Vitalik Buterin and Gavin Wood, and a talk introducing consensus theory, at Ethereum's DEVCON1 later that year.

See also

  • Deterministic Decentralization
  • Sovereign Network
Proof of Useful Work - Internet Computer Wiki (2024)

FAQs

Is Internet Computer proof of work? ›

Proof-of-useful-work (PoUW) is the Internet Computer's answer to these kinds of considerations, and is more complex than the foregoing schemes. It involves a blockchain being produced by dedicated hardware called "node machines" that are of very similar, standardized specification.

What is a useful proof of work? ›

Proof of Useful Work is the ability of a distributed network to execute smart contract computations on multiple nodes and prove that the computations were correctly calculated.

How does proof of work verify transactions? ›

It does so by having other participants in the network verify that the required amount of computing power was used by the miner that is credited with calculating the valid hash. The more miners working to verify transactions (and the faster they can generate hashes), the higher a network's hash rate.

What are the limitations of proof of work? ›

The following are the disadvantages of the Proof-of-Work (PoW) mechanism: A lot of energy gets wasted as only one miner can eventually add its block. It requires heavy computation power hence massive resource and energy consumption. A 51% attack risk on the network.

Is ICP coin a good investment? ›

These features can be widely used in the future and as a result can lead to a further increase in price for ICP token. However, as any cryptocurrency, Internet Computer crypto is quite volatile, so it can be a good choice for an investor with high risk tolerance.

Who is the owner of ICP coin? ›

The Internet Computer was built by the DFINITY Foundation, a not-for-profit organization based in Zug, Switzerland. The company's CEO and chief scientist Dominic Williams first ideated the Internet Computer Protocol (ICP) after conducting extensive research into blockchain from 2014 to 2015.

Is proof of work still used? ›

Proof-of-work systems are being used by other, more complex cryptographic systems such as bitcoin, which uses a system similar to Hashcash.

What is an example of proof of work? ›

Example of proof of work

The algorithm Bitcoin uses is called SHA-256, and it always generates hashes with 64 characters. Miners race to be the first to generate a target hash that's below the block hash. The winner gets to add the latest block of transactions to Bitcoin's blockchain.

What can you use as proof of work? ›

Types of proof of employment
  • Official pay stubs.
  • Bank statements.
  • Tax returns from the previous two years.

How secure is proof of work? ›

"Proof of work is the only consensus algorithm that has had its security battle-tested at scale and safely stored over $1 trillion in value, in the case of Bitcoin," says Hileman.

How is proof of work validated? ›

Mining and proof-of-work are closely related concepts. The term “proof of work” was coined because the network requires an enormous amount of processing capacity. Proof-of-work blockchains are secured and verified by virtual miners competing to solve a mathematical puzzle first.

What is the difference between PoS and proof of work? ›

What Is the Difference Between Proof-of-Stake and Proof-of-Work? Proof-of-Stake (POS) uses randomly selected validators to confirm transactions and create new blocks. Proof-of-Work (POW) uses a competitive validation method to confirm transactions and add new blocks to the blockchain.

What is a major problem with proof of work? ›

Problems with proof-of-work

Because proof-of-work mining requires so much computing power, it tends to consolidate miners down to the few people who can afford the equipment. It also tends to pull computing resources into locations where electricity is cheap.

What are the strengths of proof of work? ›

The advantages of the proof-of-work consensus algorithm include security and decentralization, while the disadvantages include high energy consumption and low scalability. Advantages: High security, decentralized, resistant to attacks. Disadvantages: High energy consumption, slow block generation, limited scalability.

What is proof of work in simple terms? ›

Proof of work is a consensus mechanism to choose which of these network participants—called miners—are allowed to handle the lucrative task of verifying new data. It's lucrative because the miners are rewarded with new crypto when they accurately validate the new data and don't cheat the system.

Is the internet Computer open source? ›

Open Source Policy

The DFINITY Foundation makes the code of the Internet Computer available to the public.

What is Internet Computer ICP used for? ›

The Internet Computer Protocol offers a quick and efficient blockchain to enable decentralized Web3 services. ICP is Internet Computer network's native utility token that is used to facilitate the network's governance and reward network participants.

What happened to ICP Crypto? ›

The ICP price fell under a descending resistance trend line since its launch in September 2021. The decline was a five-wave downward movement (yellow) that culminated with a low of $2.86 in September 2023.

Who is behind DFINITY? ›

About DFINITY

The DFINITY Foundation was established in 2016 in Zürich, Switzerland, by its Founder & Chief Scientist Dominic Williams. Since then, it has become the largest blockchain tech employer in Switzerland and the DACH Region.

Top Articles
Secure E- filing Accounts through e–Filing Vault
Security awareness quiz - answers
Chs.mywork
Tyler Sis 360 Louisiana Mo
Skyward Sinton
417-990-0201
Faridpur Govt. Girls' High School, Faridpur Test Examination—2023; English : Paper II
Chambersburg star athlete JJ Kelly makes his college decision, and he’s going DI
Belle Meade Barbershop | Uncle Classic Barbershop | Nashville Barbers
Soap2Day Autoplay
9192464227
How to change your Android phone's default Google account
Hawkeye 2021 123Movies
Grand Park Baseball Tournaments
Indiana Immediate Care.webpay.md
Shannon Dacombe
Mikayla Campinos Laek: The Rising Star Of Social Media
Bjerrum difference plots - Big Chemical Encyclopedia
All Obituaries | Gateway-Forest Lawn Funeral Home | Lake City FL funeral home and cremation Lake City FL funeral home and cremation
UMvC3 OTT: Welcome to 2013!
Slim Thug’s Wealth and Wellness: A Journey Beyond Music
Toothio Login
Jeff Nippard Push Pull Program Pdf
480-467-2273
Jayme's Upscale Resale Abilene Photos
JVID Rina sauce set1
Hrconnect Kp Login
1636 Pokemon Fire Red U Squirrels Download
Viduthalai Movie Download
R/Orangetheory
How To Make Infinity On Calculator
Song That Goes Yeah Yeah Yeah Yeah Sounds Like Mgmt
1400 Kg To Lb
Ma Scratch Tickets Codes
RUB MASSAGE AUSTIN
Tendermeetup Login
Build-A-Team: Putting together the best Cathedral basketball team
Today's Gas Price At Buc-Ee's
About :: Town Of Saugerties
Wilson Tattoo Shops
Vindy.com Obituaries
Umd Men's Basketball Duluth
30 Years Of Adonis Eng Sub
Arcanis Secret Santa
Spurs Basketball Reference
Copd Active Learning Template
Unblocked Games 6X Snow Rider
Rite Aid | Employee Benefits | Login / Register | Benefits Account Manager
Bf273-11K-Cl
Koniec veľkorysých plánov. Prestížna LEAF Academy mení adresu, masívny kampus nepostaví
Latest Posts
Article information

Author: Corie Satterfield

Last Updated:

Views: 5807

Rating: 4.1 / 5 (62 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Corie Satterfield

Birthday: 1992-08-19

Address: 850 Benjamin Bridge, Dickinsonchester, CO 68572-0542

Phone: +26813599986666

Job: Sales Manager

Hobby: Table tennis, Soapmaking, Flower arranging, amateur radio, Rock climbing, scrapbook, Horseback riding

Introduction: My name is Corie Satterfield, I am a fancy, perfect, spotless, quaint, fantastic, funny, lucky person who loves writing and wants to share my knowledge and understanding with you.