Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Using Useful Tasks for Proof-of-Work for Blockchain Systems

Using Useful Tasks for Proof-of-Work for Blockchain Systems This paper logically continues the paper about possible approaches to solving the “useful proof-of-work for blockchains” problem. We propose some alternative lines of searching for useful tasks for proof-of-work. These approaches are based on a fact that solving the hash puzzle is close to the multiple and independent repetition of the following experiment: assume that there is a fairly large set defined (for example, consisting of 2n elements for a fairly high n), and only a minor portion of the elements have a certain property. The experiment consists in uniformly choosing an element from this set and then checking whether this element has the indicated property. Thus the hash puzzle solution process can be replaced, for example, with searching for rare astronomical objects or positions in a game of Go that meet certain conditions. Moreover, we describe a possible attack against the blockchain system in which the task instance generation algorithm is replaced with the algorithm of choosing instances from the available database by unscrupulous task instance suppliers in case of their public collection. In addition, some ways of protecting against this attack are discussed. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Automatic Control and Computer Sciences Springer Journals

Using Useful Tasks for Proof-of-Work for Blockchain Systems

Loading next page...
 
/lp/springer-journals/using-useful-tasks-for-proof-of-work-for-blockchain-systems-jBXtzW7wOa
Publisher
Springer Journals
Copyright
Copyright © Allerton Press, Inc. 2020. ISSN 0146-4116, Automatic Control and Computer Sciences, 2020, Vol. 54, No. 7, pp. 594–600. © Allerton Press, Inc., 2020. Russian Text © The Author(s), 2019, published in Modelirovanie i Analiz Informatsionnykh Sistem, 2019, No. 2, pp. 244–255.
ISSN
0146-4116
eISSN
1558-108X
DOI
10.3103/S0146411620070160
Publisher site
See Article on Publisher Site

Abstract

This paper logically continues the paper about possible approaches to solving the “useful proof-of-work for blockchains” problem. We propose some alternative lines of searching for useful tasks for proof-of-work. These approaches are based on a fact that solving the hash puzzle is close to the multiple and independent repetition of the following experiment: assume that there is a fairly large set defined (for example, consisting of 2n elements for a fairly high n), and only a minor portion of the elements have a certain property. The experiment consists in uniformly choosing an element from this set and then checking whether this element has the indicated property. Thus the hash puzzle solution process can be replaced, for example, with searching for rare astronomical objects or positions in a game of Go that meet certain conditions. Moreover, we describe a possible attack against the blockchain system in which the task instance generation algorithm is replaced with the algorithm of choosing instances from the available database by unscrupulous task instance suppliers in case of their public collection. In addition, some ways of protecting against this attack are discussed.

Journal

Automatic Control and Computer SciencesSpringer Journals

Published: Feb 8, 2021

There are no references for this article.