wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

BLOCKCHAIN MACHANISM

profile
Ruchita Dharme
Apr 30, 2023
0 Likes
0 Discussions
227 Reads

What Is Proof of Work (PoW)?

Proof of work (PoW) describes a consensus mechanism that requires a significant amount of computing effort from a network of devices. The concept was adapted digital tokens by Hal Finney in 2004 through the idea of "reusable proof of work" using the 160-bit secure hash algorithm 1 (SHA-1).

Following its introduction in 2009, Bitcoin became the first widely adopted application of Finney's PoW idea (Finney was also the recipient of the first bitcoin transaction). Proof of work forms the basis of many other cryptocurrencies, allowing for secure consensus.

Proof of Work Blockchains

Blockchains are distributed ledgers that record all bitcoin transactions, similarly to how you would enter transactions in a spreadsheet. Each block is similar to a cell. Information such as transaction amounts, wallet addresses, time, and date are recorded and encrypted into a block header—a hexadecimal number created through the blockchain's hashing function.

The hash from each block is used in the block that follows it when its hash is created. This creates a ledger of chained blocks that cannot be altered because the information from every block is included in the newest block's hash.

Proof of Work vs. Proof of Stake

The two most popular consensus mechanisms are proof of work and proof of stake. Bitcoin's top competitor Ethereum used proof of work on its blockchain until September 2022, when the highly-anticipated transition to proof of stake was made. Here are some of the key differences between the two.

Proof of Work
  • Validation is done by a network of miners

  • Bitcoin paid as a reward and for transaction fees

  • Competitive nature uses lots of energy and computational power

Proof of Stake
  • Validation is done by participants who offer ether as collateral

  • Ether is paid for transaction fees only

  • Less computational power and energy used


Comments ()


Sign in

Read Next

The most common internet security threats

Blog banner

Education: Key to your Prosperity

Blog banner

Danger assessment in GIS

Blog banner

Optimization of operating system design

Blog banner

Dental Problems That Start Small But Should Never Be Ignored

Blog banner

Understanding Univariate, Bivariate, and Multivariate Analysis in Data Science

Blog banner

The launch of UniMap by HERE

Blog banner

Delhi city

Blog banner

Why Data Security Is Important

Blog banner

The Importance of Data Quality Management in Data Science

Blog banner

Royal enfield

Blog banner

Operating System Objectives and Functions

Blog banner

Teenagers of Today

Blog banner

Throttle engine ’Sneak peek into the future’

Blog banner

This too shall pass

Blog banner

Brilliant WhatsApp Features Upcoming in 2023

Blog banner

The Memory Hierarchy

Blog banner

Is Social Media Marketing The Next Wave Of Digital Marketing?

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

Mendeley (management software)

Blog banner

File system

Blog banner

Memory management

Blog banner

Deadlock

Blog banner

Perfect Moments to Wear a Rich Patola Design Outfit

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

PERSONALITY DEVELOPMENT

Blog banner

MODERN OPERATING SYSTEMS

Blog banner

URL vs Domain

Blog banner

Top Career Paths After a B.Com Degree in Mumbai: What’s Next for You?

Blog banner

Chicken Dum Biryani

Blog banner

Women Empowerment

Blog banner

The Bold Digital Marketing Moves That Made Durex India’s Second-Largest Condom Brand

Blog banner

Why Consistency in Eating Habits Matters and How Meal Maharaj Makes It Easy

Blog banner

What is OS Fingerprinting?

Blog banner

Why Summer Break Is Important for Emotional and Cognitive Growth?

Blog banner

Ubiquitous Computing

Blog banner

Ethical Hacking

Blog banner

Unlocking the Secrets: Basic Operations of Computer Forensic Laboratories

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

Yahoo! mail

Blog banner

Broken Authentication Attacks

Blog banner

Data is an asset and it is your responsibility!

Blog banner