wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

BLOCKCHAIN MACHANISM

profile
Ruchita Dharme
Apr 30, 2023
0 Likes
0 Discussions
227 Reads

What Is Proof of Work (PoW)?

Proof of work (PoW) describes a consensus mechanism that requires a significant amount of computing effort from a network of devices. The concept was adapted digital tokens by Hal Finney in 2004 through the idea of "reusable proof of work" using the 160-bit secure hash algorithm 1 (SHA-1).

Following its introduction in 2009, Bitcoin became the first widely adopted application of Finney's PoW idea (Finney was also the recipient of the first bitcoin transaction). Proof of work forms the basis of many other cryptocurrencies, allowing for secure consensus.

Proof of Work Blockchains

Blockchains are distributed ledgers that record all bitcoin transactions, similarly to how you would enter transactions in a spreadsheet. Each block is similar to a cell. Information such as transaction amounts, wallet addresses, time, and date are recorded and encrypted into a block header—a hexadecimal number created through the blockchain's hashing function.

The hash from each block is used in the block that follows it when its hash is created. This creates a ledger of chained blocks that cannot be altered because the information from every block is included in the newest block's hash.

Proof of Work vs. Proof of Stake

The two most popular consensus mechanisms are proof of work and proof of stake. Bitcoin's top competitor Ethereum used proof of work on its blockchain until September 2022, when the highly-anticipated transition to proof of stake was made. Here are some of the key differences between the two.

Proof of Work
  • Validation is done by a network of miners

  • Bitcoin paid as a reward and for transaction fees

  • Competitive nature uses lots of energy and computational power

Proof of Stake
  • Validation is done by participants who offer ether as collateral

  • Ether is paid for transaction fees only

  • Less computational power and energy used


Comments ()


Sign in

Read Next

10 Alien Encounters and Abduction Stories

Blog banner

Jira service Management

Blog banner

Different types of scam Fraud

Blog banner

File System

Blog banner

Cloud Computing: Threats and Vulnerabilities

Blog banner

Indian Culture and Tradition

Blog banner

World’s rarest passport owned by 500 people.

Blog banner

How To Invest In Indian Stock Market @ BSE & NSE ~ Tutorial 3

Blog banner

Building a Better You: Fitness Tips and Inspiration.

Blog banner

Interrupts in OS

Blog banner

Multiprocessor and scheduling

Blog banner

Expert System In AI

Blog banner

Traditional Unix System

Blog banner

Direct Memory Access

Blog banner

Security issues

Blog banner

SQL Injection

Blog banner

How Schools Can Reduce Exam Stress in Students?

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Smitten Kitchen Keepers

Blog banner

Veg/Non-veg/Egg Tiffin Meals That Are Nutritious and Filling

Blog banner

Open Source Project By Google

Blog banner

IoT Evolution

Blog banner

Why Meal Maharaj Prioritises Seasonal Vegetables in Every Meal Box

Blog banner

Supervised and unsupervised learning

Blog banner

Elegant fashion style

Blog banner

Why Kanye West (Now Ye) is the GOAT: A Legacy Beyond Music

Blog banner

10 Types of Friends in every friend group

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

Everything You Need for a Perfect Stay in Arcadia, Florida, USA.

Blog banner

How India made the GIS its Own, and its Use in Infrastructural Developments

Blog banner

10 Interesting facts you should know!!!

Blog banner

social media issue

Blog banner

Internet of Things and cyber security

Blog banner

Fudgy Tahini Date Chocolate Bars

Blog banner

WINDOWS I/ O

Blog banner

Dangers of Using Public WiFis

Blog banner

Decision Tree: A Diagram Model

Blog banner

Why am I never satisfied with my Life?

Blog banner

Security in Operating Systems

Blog banner

Cloud Security: Trends and Innovations

Blog banner

Types of Hackers

Blog banner

FREE VERSION OF G-MAIL

Blog banner