wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

BLOCKCHAIN MACHANISM

profile
Ruchita Dharme
Apr 30, 2023
0 Likes
0 Discussions
227 Reads

What Is Proof of Work (PoW)?

Proof of work (PoW) describes a consensus mechanism that requires a significant amount of computing effort from a network of devices. The concept was adapted digital tokens by Hal Finney in 2004 through the idea of "reusable proof of work" using the 160-bit secure hash algorithm 1 (SHA-1).

Following its introduction in 2009, Bitcoin became the first widely adopted application of Finney's PoW idea (Finney was also the recipient of the first bitcoin transaction). Proof of work forms the basis of many other cryptocurrencies, allowing for secure consensus.

Proof of Work Blockchains

Blockchains are distributed ledgers that record all bitcoin transactions, similarly to how you would enter transactions in a spreadsheet. Each block is similar to a cell. Information such as transaction amounts, wallet addresses, time, and date are recorded and encrypted into a block header—a hexadecimal number created through the blockchain's hashing function.

The hash from each block is used in the block that follows it when its hash is created. This creates a ledger of chained blocks that cannot be altered because the information from every block is included in the newest block's hash.

Proof of Work vs. Proof of Stake

The two most popular consensus mechanisms are proof of work and proof of stake. Bitcoin's top competitor Ethereum used proof of work on its blockchain until September 2022, when the highly-anticipated transition to proof of stake was made. Here are some of the key differences between the two.

Proof of Work
  • Validation is done by a network of miners

  • Bitcoin paid as a reward and for transaction fees

  • Competitive nature uses lots of energy and computational power

Proof of Stake
  • Validation is done by participants who offer ether as collateral

  • Ether is paid for transaction fees only

  • Less computational power and energy used


Comments ()


Sign in

Read Next

INTERNET

Blog banner

bulk email software

Blog banner

Building a Better You: Fitness Tips and Inspiration.

Blog banner

TOP 5 GAMING GADGETS (2024)

Blog banner

Understanding E-mail Servers

Blog banner

Data Security must be your Priority!

Blog banner

Full Disk Encryption

Blog banner

Shoulders

Blog banner

What is Minting & Mining

Blog banner

Linux -V Server Virtual Machine

Blog banner

Cyber Forensic in the Banking sector

Blog banner

File Management In OS

Blog banner

Ethical Issues in Data Science and Role of Data Science in Smart Cities

Blog banner

Vikrant’s first blog

Blog banner

First-Order Logic (FOL): The Foundation of Modern Logic

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner

Intrusion Detection System

Blog banner

A True Friendship

Blog banner

Mumbaicha Dabbawalla

Blog banner

Memory Management

Blog banner

How To Setup DVWA Using XAMPP on Windows

Blog banner

Life

Blog banner

Disk scheduling

Blog banner

Solving Problems with AI: The Power of Search Algorithms

Blog banner

DISK SCHEDULING

Blog banner

Love is in air.....

Blog banner

Modern OS

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

Tomato Butter Sauce with Bucatini

Blog banner

Threads

Blog banner

Know your Processors!

Blog banner

Yoga in INDIA and ABROAD

Blog banner

The Features of Blockchain

Blog banner

RACI model in IT services

Blog banner

Data Analytics in Data Science

Blog banner

Goa Trip With Friends

Blog banner

Web browser forensics:Tools,Evidence collection and analysis

Blog banner

Image Steganography: Hiding Secrets in Plain Sight

Blog banner

Defining youtubr

Blog banner

Data Lake

Blog banner

Travel Geek ‘The last $50k in Switzerland’

Blog banner

Memory management

Blog banner