Lecture 14: Non-SHA256 Proof-of-Work

Sdílet
Vložit
  • čas přidán 7. 08. 2024
  • Non-SHA256 Proof-of-Work
    - Progress-freeness
    - ASIC-resistant (not ASIC-proof) puzzles
    - Memory-hard puzzles (e.g. Scrypt)
    - Proof-of-useful-work
    - Non-outsourceable Puzzles

Komentáře • 2

  • @sotetoldal5081
    @sotetoldal5081 Před 2 lety +1

    great content

  • @cesarsanchez5576
    @cesarsanchez5576 Před 2 lety +1

    My notes:
    * Proof-of-work relies on the hash puzzle (Mining)
    * Mining requires specialized hardware
    * Can we make proof-of-work algorithm that doesn’t require expensive hardware? Yes, memory-hard puzzles and memory-bound puzzles
    * Memory-hard: requires a lot of memory to be calculated (ex: million x million array)
    * Memory-bound: requires a more of memory access over memory capacity
    * For ASIC resistance, we want memory-bound and memory-bound puzzles
    * Sha-256 is neither memory-hard nor memory-bound
    * Scrypt (pronounced “ess-crypt”) and Cuckoo Cycle are hashing algorithms that are memory-dependant and non-trivial to calculate
    * Primecoin is a cryptocurrency that makes something “useful” with its PoW algorithm which is finding Cunningham Chains of Prime Numbers
    * Mining Pools tend to lead to centralization
    * There are Nonoutsourceable puzzles in the literature that disincentivize pools but none has been implemented