SlideShare uma empresa Scribd logo
1 de 8
PROOFS ON CRYPTO
CURRENCIES
PABLO SERRANO
IVAN SANCHEZ
PROOF OF STAKE
• Also helps to secure the network.
• Proposed by King and Nadal in 2012
• Based on Coin Age: Combination of Amount of currency owned and the time
held.
• Coin Age is a measure in
• determining staking weight and
• Probability of a PoS coin holder winning a block.
• PoS is a Form of proof of ownership of the currency.
• Coin age can be considered a form of PoS
• PoS cannot be easily forged (key requirement of monetary systems).
• PoS block mints coins based on the consumed coin age in the coinstake
transaction.
BLOCK SIGNATURE & DUPLICATE STAKE
PROTOCOL
• Each block must be signed by owner to prevent replay attacks.
• Duplicate-stake protocol defends against attackers using a
single PoS to generate multiple blocks as a DoS Attack.
HASHING
• Input of Coinstake:
• Kernel: Required to meet certain hash target protocol.
• The hashing operation is done over a limited search space.
• Hash target that stake Kernel must meet is a target per unit
coin age (coin-day).
MAIN CHAIN PROTOCOL
• Protocol for determining the main chain relies on coin-age.
• Every transaction in a block contributes its consumed coin age to the
score or the block.
• Block with highest consumed coin age is the main chain
DIFFERENCES WITH POW
• As opposed to Proof of Work (Pow)
• Lower computational cost & more energy efficient (less
environmental costs)
• Lower entry barrier for newcomers
• Main chain is determined by total consumed coin age and not by total
work of block.
• Cost of controlling significant stake might be higher tan cost of
acquiring mining power.
• When PoW mint rate approaches 0, there is less incentive to mint
blocks. If energy consumption reaches 0, protection for PoW decays.
PoS is immune to this.
PROBLEMS
• First PoS eliminates competitive model that incentivized users
to participate actively (active nodes) in Network maintenance.
• Some coin holders accrued interest without contributing to
secure the network.
• Lower cost of attacks on the entire blockchain (due to total
consumed coin age main chain determinism method).
• No completely distributed, some centralized checkpoints are
needed to secure block chain.
OTHER VARIATIONS
• Eliminate Coin Age (PoS 2.0)
• Proof of Stake Velocity (PoSV): Reward active participants and
punish infrequent stakers (Give big reward to those who win
blocks every 2 weeks)
• Proof of Stake: Definite (PoS:D). Replaces interest based stake
reward system with a inflationary system of constant rewards.
• Ensures that a set amount of coins are issued each block.

Mais conteúdo relacionado

Destaque

Destaque (10)

Proof-of-Stake & Its Improvements (San Francisco Bitcoin Devs Hackathon)
Proof-of-Stake & Its Improvements (San Francisco Bitcoin Devs Hackathon)Proof-of-Stake & Its Improvements (San Francisco Bitcoin Devs Hackathon)
Proof-of-Stake & Its Improvements (San Francisco Bitcoin Devs Hackathon)
 
Hands on with multichain
Hands on with multichainHands on with multichain
Hands on with multichain
 
Smart Contracts and Identity
Smart Contracts and IdentitySmart Contracts and Identity
Smart Contracts and Identity
 
An Introduction to Blockchain
An Introduction to BlockchainAn Introduction to Blockchain
An Introduction to Blockchain
 
BlockChain Public
BlockChain PublicBlockChain Public
BlockChain Public
 
Understanding private blockchains
Understanding private blockchainsUnderstanding private blockchains
Understanding private blockchains
 
Open API and API Management - Introduction and Comparison of Products: TIBCO ...
Open API and API Management - Introduction and Comparison of Products: TIBCO ...Open API and API Management - Introduction and Comparison of Products: TIBCO ...
Open API and API Management - Introduction and Comparison of Products: TIBCO ...
 
Understanding blockchain
Understanding blockchainUnderstanding blockchain
Understanding blockchain
 
CBGTBT - Part 3 - Transactions 101
CBGTBT - Part 3 - Transactions 101CBGTBT - Part 3 - Transactions 101
CBGTBT - Part 3 - Transactions 101
 
CBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primerCBGTBT - Part 1 - Workshop introduction & primer
CBGTBT - Part 1 - Workshop introduction & primer
 

Semelhante a Proofs on cryptocurrencies

Semelhante a Proofs on cryptocurrencies (20)

different consensus protocols in blockchian.pptx
different consensus protocols in blockchian.pptxdifferent consensus protocols in blockchian.pptx
different consensus protocols in blockchian.pptx
 
Bitcoin Decision Point - April 2017
Bitcoin Decision Point - April 2017Bitcoin Decision Point - April 2017
Bitcoin Decision Point - April 2017
 
Introduction to Blockchain Technology
Introduction to Blockchain TechnologyIntroduction to Blockchain Technology
Introduction to Blockchain Technology
 
Blockchain
BlockchainBlockchain
Blockchain
 
Overview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus MechanismsOverview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus Mechanisms
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
 
MyCrypto Release 9/14/18
MyCrypto Release 9/14/18MyCrypto Release 9/14/18
MyCrypto Release 9/14/18
 
Indjic fintech module 6
Indjic fintech module 6Indjic fintech module 6
Indjic fintech module 6
 
BitCoin explained
BitCoin explainedBitCoin explained
BitCoin explained
 
Overview of bitcoin
Overview of bitcoinOverview of bitcoin
Overview of bitcoin
 
Fundametals of Blockchain and basics_L1.pptx
Fundametals of Blockchain and basics_L1.pptxFundametals of Blockchain and basics_L1.pptx
Fundametals of Blockchain and basics_L1.pptx
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
Blockchain
BlockchainBlockchain
Blockchain
 
BASIS MARKETS - DAO_proposal_1_-_The_BASIS_Token.pdf
BASIS MARKETS - DAO_proposal_1_-_The_BASIS_Token.pdfBASIS MARKETS - DAO_proposal_1_-_The_BASIS_Token.pdf
BASIS MARKETS - DAO_proposal_1_-_The_BASIS_Token.pdf
 
How to Mine with CPU Machines
How to Mine with CPU MachinesHow to Mine with CPU Machines
How to Mine with CPU Machines
 
Node.js Blockchain Implementation
Node.js Blockchain ImplementationNode.js Blockchain Implementation
Node.js Blockchain Implementation
 
Ergo Presentation - Tokyo
Ergo Presentation - TokyoErgo Presentation - Tokyo
Ergo Presentation - Tokyo
 
What is MultiChain Technology?
What is MultiChain Technology?What is MultiChain Technology?
What is MultiChain Technology?
 
BITCOIN EXPLAINED
BITCOIN EXPLAINEDBITCOIN EXPLAINED
BITCOIN EXPLAINED
 
Blockchain Ecosystem and Cryptocurrency Regulations
Blockchain Ecosystem and Cryptocurrency RegulationsBlockchain Ecosystem and Cryptocurrency Regulations
Blockchain Ecosystem and Cryptocurrency Regulations
 

Mais de Iván Sanchez Vera

Economia de Recursos Naturales y Economia Tradicional
Economia de Recursos Naturales y Economia TradicionalEconomia de Recursos Naturales y Economia Tradicional
Economia de Recursos Naturales y Economia Tradicional
Iván Sanchez Vera
 
Nociones básica de ecología y recursos naturales.
Nociones básica de ecología y recursos naturales. Nociones básica de ecología y recursos naturales.
Nociones básica de ecología y recursos naturales.
Iván Sanchez Vera
 
Proceso de Adquisiciones de Tecnologia
Proceso de Adquisiciones de TecnologiaProceso de Adquisiciones de Tecnologia
Proceso de Adquisiciones de Tecnologia
Iván Sanchez Vera
 

Mais de Iván Sanchez Vera (20)

Git res baz ec - final
Git   res baz ec - finalGit   res baz ec - final
Git res baz ec - final
 
Intro a Metodos Numericos
Intro a Metodos NumericosIntro a Metodos Numericos
Intro a Metodos Numericos
 
Intro Inteligencia Artificial (AI)
Intro Inteligencia Artificial (AI)Intro Inteligencia Artificial (AI)
Intro Inteligencia Artificial (AI)
 
Trajectory clustering - Traclus Algorithm
Trajectory clustering - Traclus AlgorithmTrajectory clustering - Traclus Algorithm
Trajectory clustering - Traclus Algorithm
 
Social databases - A brief overview
Social databases - A brief overviewSocial databases - A brief overview
Social databases - A brief overview
 
(Draft) Nuevos caminos de innovación en tecnología
(Draft) Nuevos caminos de innovación en tecnología(Draft) Nuevos caminos de innovación en tecnología
(Draft) Nuevos caminos de innovación en tecnología
 
Pin payments presentation final (4)
Pin payments presentation final (4)Pin payments presentation final (4)
Pin payments presentation final (4)
 
Impacto de las Actividades Economicas sobre las Funciones de la Biosfera.pptx
Impacto de las Actividades Economicas sobre las Funciones de la Biosfera.pptxImpacto de las Actividades Economicas sobre las Funciones de la Biosfera.pptx
Impacto de las Actividades Economicas sobre las Funciones de la Biosfera.pptx
 
Funciones Economicas Biosfera
Funciones Economicas BiosferaFunciones Economicas Biosfera
Funciones Economicas Biosfera
 
Economia de Recursos Naturales y Economia Tradicional
Economia de Recursos Naturales y Economia TradicionalEconomia de Recursos Naturales y Economia Tradicional
Economia de Recursos Naturales y Economia Tradicional
 
Nociones básica de ecología y recursos naturales.
Nociones básica de ecología y recursos naturales. Nociones básica de ecología y recursos naturales.
Nociones básica de ecología y recursos naturales.
 
Economia de Recursos Naturales
Economia de Recursos NaturalesEconomia de Recursos Naturales
Economia de Recursos Naturales
 
Tolerencia de fallas
Tolerencia de fallasTolerencia de fallas
Tolerencia de fallas
 
Ingenieria software
Ingenieria softwareIngenieria software
Ingenieria software
 
Pruebas de Software
Pruebas de SoftwarePruebas de Software
Pruebas de Software
 
Proceso de Adquisiciones de Tecnologia
Proceso de Adquisiciones de TecnologiaProceso de Adquisiciones de Tecnologia
Proceso de Adquisiciones de Tecnologia
 
Proceso de Compra de Tecnologia
Proceso de Compra de TecnologiaProceso de Compra de Tecnologia
Proceso de Compra de Tecnologia
 
Pasos para elaborar RFP
Pasos para elaborar  RFPPasos para elaborar  RFP
Pasos para elaborar RFP
 
Redes ieee 802_11n
Redes ieee 802_11nRedes ieee 802_11n
Redes ieee 802_11n
 
Formacion de Empresas
Formacion de EmpresasFormacion de Empresas
Formacion de Empresas
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Proofs on cryptocurrencies

  • 1. PROOFS ON CRYPTO CURRENCIES PABLO SERRANO IVAN SANCHEZ
  • 2. PROOF OF STAKE • Also helps to secure the network. • Proposed by King and Nadal in 2012 • Based on Coin Age: Combination of Amount of currency owned and the time held. • Coin Age is a measure in • determining staking weight and • Probability of a PoS coin holder winning a block. • PoS is a Form of proof of ownership of the currency. • Coin age can be considered a form of PoS • PoS cannot be easily forged (key requirement of monetary systems). • PoS block mints coins based on the consumed coin age in the coinstake transaction.
  • 3. BLOCK SIGNATURE & DUPLICATE STAKE PROTOCOL • Each block must be signed by owner to prevent replay attacks. • Duplicate-stake protocol defends against attackers using a single PoS to generate multiple blocks as a DoS Attack.
  • 4. HASHING • Input of Coinstake: • Kernel: Required to meet certain hash target protocol. • The hashing operation is done over a limited search space. • Hash target that stake Kernel must meet is a target per unit coin age (coin-day).
  • 5. MAIN CHAIN PROTOCOL • Protocol for determining the main chain relies on coin-age. • Every transaction in a block contributes its consumed coin age to the score or the block. • Block with highest consumed coin age is the main chain
  • 6. DIFFERENCES WITH POW • As opposed to Proof of Work (Pow) • Lower computational cost & more energy efficient (less environmental costs) • Lower entry barrier for newcomers • Main chain is determined by total consumed coin age and not by total work of block. • Cost of controlling significant stake might be higher tan cost of acquiring mining power. • When PoW mint rate approaches 0, there is less incentive to mint blocks. If energy consumption reaches 0, protection for PoW decays. PoS is immune to this.
  • 7. PROBLEMS • First PoS eliminates competitive model that incentivized users to participate actively (active nodes) in Network maintenance. • Some coin holders accrued interest without contributing to secure the network. • Lower cost of attacks on the entire blockchain (due to total consumed coin age main chain determinism method). • No completely distributed, some centralized checkpoints are needed to secure block chain.
  • 8. OTHER VARIATIONS • Eliminate Coin Age (PoS 2.0) • Proof of Stake Velocity (PoSV): Reward active participants and punish infrequent stakers (Give big reward to those who win blocks every 2 weeks) • Proof of Stake: Definite (PoS:D). Replaces interest based stake reward system with a inflationary system of constant rewards. • Ensures that a set amount of coins are issued each block.

Notas do Editor

  1. Some coinholders were rewarded interest for holding their coins, without actually taking any burden to secure the network.