wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

BLOCKCHAIN MACHANISM

profile
Ruchita Dharme
Apr 30, 2023
0 Likes
0 Discussions
227 Reads

What Is Proof of Work (PoW)?

Proof of work (PoW) describes a consensus mechanism that requires a significant amount of computing effort from a network of devices. The concept was adapted digital tokens by Hal Finney in 2004 through the idea of "reusable proof of work" using the 160-bit secure hash algorithm 1 (SHA-1).

Following its introduction in 2009, Bitcoin became the first widely adopted application of Finney's PoW idea (Finney was also the recipient of the first bitcoin transaction). Proof of work forms the basis of many other cryptocurrencies, allowing for secure consensus.

Proof of Work Blockchains

Blockchains are distributed ledgers that record all bitcoin transactions, similarly to how you would enter transactions in a spreadsheet. Each block is similar to a cell. Information such as transaction amounts, wallet addresses, time, and date are recorded and encrypted into a block header—a hexadecimal number created through the blockchain's hashing function.

The hash from each block is used in the block that follows it when its hash is created. This creates a ledger of chained blocks that cannot be altered because the information from every block is included in the newest block's hash.

Proof of Work vs. Proof of Stake

The two most popular consensus mechanisms are proof of work and proof of stake. Bitcoin's top competitor Ethereum used proof of work on its blockchain until September 2022, when the highly-anticipated transition to proof of stake was made. Here are some of the key differences between the two.

Proof of Work
  • Validation is done by a network of miners

  • Bitcoin paid as a reward and for transaction fees

  • Competitive nature uses lots of energy and computational power

Proof of Stake
  • Validation is done by participants who offer ether as collateral

  • Ether is paid for transaction fees only

  • Less computational power and energy used


Comments ()


Sign in

Read Next

Data Visualization in Decision-Making

Blog banner

I/O Management and Disk Scheduling

Blog banner

Cache memory

Blog banner

Virus

Blog banner

Spotify

Blog banner

IT RISK

Blog banner

Cache Memory(142)

Blog banner

ONLINE NEWSROOMS

Blog banner

Concurrency and Deadlocks

Blog banner

Processes : Process description and control

Blog banner

Deadlock

Blog banner

Monday. com App

Blog banner

Access management

Blog banner

When Is the Right Time to Enrol My Toddler Into Preschool? NEP

Blog banner

Service transistion under difficult conditions

Blog banner

Service transition principles

Blog banner

File management in os

Blog banner

The Real Reason Patola Outfits Come at a Premium Cost

Blog banner

Virtual Memory

Blog banner

Types of Threads

Blog banner

MEMORY MANAGEMENT

Blog banner

Vulnerability Assessment (Vulnerability Analysis)

Blog banner

Design Considerations for Disk Cache Management

Blog banner

Deadlock and Starvation

Blog banner

ADIDAS

Blog banner

Apple

Blog banner

10 Reasons to date your best friend

Blog banner

What is Virtual Memory

Blog banner

Jira service Management

Blog banner

Ethical Hacking

Blog banner

DIGITAL ECONOMY

Blog banner

Memory management

Blog banner

What is Segmentation?

Blog banner

Electronic Funds Transfer

Blog banner

Kernel Memory Allocation In Linux.

Blog banner

Deadlock

Blog banner

How Social Media Algorithms Will Work in 2026?

Blog banner

Tiranga - Abbas Haveliwala

Blog banner

OS Evolution Achievements

Blog banner

Visualization in Data Science

Blog banner

Disk cache

Blog banner

Deadlock

Blog banner