wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

BLOCKCHAIN MACHANISM

profile
Ruchita Dharme
Apr 30, 2023
0 Likes
0 Discussions
227 Reads

What Is Proof of Work (PoW)?

Proof of work (PoW) describes a consensus mechanism that requires a significant amount of computing effort from a network of devices. The concept was adapted digital tokens by Hal Finney in 2004 through the idea of "reusable proof of work" using the 160-bit secure hash algorithm 1 (SHA-1).

Following its introduction in 2009, Bitcoin became the first widely adopted application of Finney's PoW idea (Finney was also the recipient of the first bitcoin transaction). Proof of work forms the basis of many other cryptocurrencies, allowing for secure consensus.

Proof of Work Blockchains

Blockchains are distributed ledgers that record all bitcoin transactions, similarly to how you would enter transactions in a spreadsheet. Each block is similar to a cell. Information such as transaction amounts, wallet addresses, time, and date are recorded and encrypted into a block header—a hexadecimal number created through the blockchain's hashing function.

The hash from each block is used in the block that follows it when its hash is created. This creates a ledger of chained blocks that cannot be altered because the information from every block is included in the newest block's hash.

Proof of Work vs. Proof of Stake

The two most popular consensus mechanisms are proof of work and proof of stake. Bitcoin's top competitor Ethereum used proof of work on its blockchain until September 2022, when the highly-anticipated transition to proof of stake was made. Here are some of the key differences between the two.

Proof of Work
  • Validation is done by a network of miners

  • Bitcoin paid as a reward and for transaction fees

  • Competitive nature uses lots of energy and computational power

Proof of Stake
  • Validation is done by participants who offer ether as collateral

  • Ether is paid for transaction fees only

  • Less computational power and energy used


Comments ()


Sign in

Read Next

Buffer overflow

Blog banner

Multithreading in Operating System

Blog banner

Sweet and Sour Mango Pickle (Gol Keri)

Blog banner

What are the different types of E-mail crime and process of email forensic?

Blog banner

MEMORY MANAGEMENT FILE

Blog banner

Memory Management

Blog banner

Soak knowledge and level up your intellectual potential!!!

Blog banner

All you need to know about “On-page SEO”

Blog banner

Key to success in Sports

Blog banner

Types of Malware in Cyber Security

Blog banner

MAJOR ACHIEVEMENTS OF OS

Blog banner

Go Daddy

Blog banner

Modern Operating Systems.

Blog banner

EVOLUTION OF THE MIRCOPROCESSOR

Blog banner

Women empowerment

Blog banner

File Organization and Access

Blog banner

Deadlock

Blog banner

INTERNET SECURITY

Blog banner

GIS Topography

Blog banner

Virtual Machine

Blog banner

Why Extreme Opinions Are Rising: Psychological Insights into Society’s Divides

Blog banner

EID UL FITR

Blog banner

Proof-of-Stake (PoS)

Blog banner

Top 10 Logos and their meanings

Blog banner

Process, process creation and process termination

Blog banner

AI and Data Science: Revolutionizing Industries

Blog banner

Evolution of operating systems

Blog banner

Scheduling

Blog banner

Hello World

Blog banner

Data is an asset and it is your responsibility!

Blog banner

Cyber Attacks -- Trends Patterns and Security Countermeasures

Blog banner

Cache Memory

Blog banner

Mango Raisin Chutney (sweet mango raisin spread)

Blog banner

Music

Blog banner

Deadlock and Starvation

Blog banner

Introduction to Virtual Memory - 080

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

How User Data Shapes Personalised Campaigns

Blog banner

Social Media.

Blog banner

Modern Operating system

Blog banner

Why Does Hierarchy Still matter in Organizations?

Blog banner

Next time you click on "Remind me later", think twice!

Blog banner