1. Trang chủ
  2. » Luận Văn - Báo Cáo

CRYPTOCURRENCY TECHNOLOGIES ALTERNATIVE MINING PUZZLES

26 0 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Công Nghệ Thông Tin, it, phầm mềm, website, web, mobile app, trí tuệ nhân tạo, blockchain, AI, machine learning - Công Nghệ Thông Tin, it, phầm mềm, website, web, mobile app, trí tuệ nhân tạo, blockchain, AI, machine learning - Công nghệ thông tin Cryptocurrency Technologies Alternative Mining Puzzles 1 Alternative Mining Puzzles Essential Puzzle Requirements ASIC-Resistant Puzzles Proof-of-Useful-Work Non-outsourceable Puzzles Proof-of-Stake “Virtual Mining” Puzzles (recap) Incentive system steers participants Basic features of Bitcoin’s puzzle The puzzle is difficult to solve, so attacks are costly … but not too hard, so honest miners are compensated Q: What other features could a puzzle have? Cryptocurrency Technologies Alternative Mining Puzzles 2 On today’s menu . . . Alternative puzzle designs Used in practice, and speculative Variety of possible goals ASIC resistance, pool resistance, intrinsic benefits, etc. Essential security requirements Alternative Mining Puzzles Essential Puzzle Requirements ASIC-Resistant Puzzles Proof-of-Useful-Work Non-outsourceable Puzzles Proof-of-Stake “Virtual Mining” Cryptocurrency Technologies Alternative Mining Puzzles 3 Puzzle Requirements A puzzle should ... – be cheap to verify – have adjustable difficulty – – have a chance of winning that is proportional to hashpower Large player get only proportional advantage Even small players get proportional compensation Bad Puzzle: a sequential Puzzle Consider a puzzle that takes N steps to solve a “Sequential” Proof of Work Solution Found N Cryptocurrency Technologies Alternative Mining Puzzles 4 Bad Puzzle: a sequential Puzzle Problem: fastest miner always wins the race Solution Found Good Puzzle => Weighted Sample This property is sometimes called progress free. Cryptocurrency Technologies Alternative Mining Puzzles 5 Alternative Mining Puzzles Essential Puzzle Requirements ASIC-Resistant Puzzles Proof-of-Useful-Work Non-outsourceable Puzzles Proof-of-Stake “Virtual Mining” ASIC Resistance – Why? Goal: Ordinary people with idle laptops, PCs, or even mobile phones can mine Lower barrier to entry Approach: Reduce the gap between custom hardware and general purpose equipment. Cryptocurrency Technologies Alternative Mining Puzzles 6 Memory-hard Puzzles Premise: the cost and performance of memory is more stable than for processors ‘80 ‘90 ‘00 ‘10 ‘14 Time Performance 10000 1000 100 10 “performance gap” Processor Memory Storage Example: scrypt (Colin Percival, 2009) Memory hard hash function (requires large amounts of memory) => Prevents large-scale parallel attack with limited resources. Most widely used alternative Bitcoin puzzle (e.g. in LiteCoin) Also used elsewhere in security (PW-hashing, Tarsnap) 1. Fill memory with random values 2. Read from the memory in random order Cryptocurrency Technologies Alternative Mining Puzzles 7 scrypt – Step 1 of 2 (write) Input: X V1 = H(X) V2 = H(V1) = H(H(X)) V3 = H(V2) = H3(X) … VN = HN(X) V1V1 V2V1 V2 V3V1 V2 V3 ... ... ... ... ... ... ... ... ... ... ... …. ... ... ... ... ... ... … ... ... ... ... ... ... ... ... ... ... ... ... ... VN scrypt – Step 2 of 2 (read) Input: X A := HN+1(X) For N iterations: i := A mod N A := H(A xor Vi) Output: A V1 V2 V3 ... ... ... ... ... ... ... ... ... ... ... …. ... ... ... ... ... ... … ... ... ... ... ... ... ... ... ... ... ... ... ... VN Cryptocurrency Technologies Alternative Mining Puzzles 8 scrypt – TimeMemory Tradeoff Q: Why is this memory-hard? Reduce memory by half, 1.5x the steps V1 V3 V5 ... ... ... ... …. ... ... Vi -1 Vi ... ... ... ... ... ... ... Need to access Vi where i is even? first, access Vi-1 then, compute Vi = H(Vi-1) scrypt - Discussion Disadvantages: Also requires N steps, N memory to check Is it actually ASIC resistant? scrypt ASICs are already available http:zeusminer.com Cryptocurrency Technologies Alternative Mining Puzzles 9 Is there a cycle of size K? If so, Output: X, K edges Cookoo Hash Cycles (John Tromp, 2014) Example of a memory hard puzzle that’s cheap to verify. Input: X For i = 1 to E: a := H0(X + i) b := N + H1(X + i) edge(a mod N, b mod N) N Even more Approaches More complicated hash functions X11: 11 different hash functions combined Moving target Change the puzzle periodically Cryptocurrency Technologies Alternative Mining Puzzles 10 Counter Argument: SHA2 is fine Bitcoin Mining ASICs aren’t changing much. Big ASICs only marginally more performant than small ones. SHA2 Ordinary SHA2 Circuit SHA2 SHA2 SHA2 SHA2SHA2 SHA2 SHA2 SHA2 SHA2 SHA2SHA2 SHA2 SHA2 SHA2 SHA2 SHA2SHA2 SHA2 ... ... Affordable ASIC Expensive ASIC Alternative Mining Puzzles Essential Puzzle Requirements ASIC-Resistant Puzzles Proof-of-Useful-Work Non-outsourceable Puzzles Proof-of-Stake “Virtual Mining” Cryptocurrency Technologies Alternative Mining Puzzles 11 Recovering wasted Work Recall: between 150 MW – 900 MW power consumed (as of mid 2014) Natural Question: Can we recycle this and do something useful? Candidates – Needle in a Haystack Natural choices: – Protein folding (find a low-energy configuration) – Search for aliens (find anomalous region of signal) (These have been successful Home problems) Challenges: – Randomly chosen instances must be hard Cryptocurrency Technologies Alternative Mining Puzzles 12 Primecoin (Sunny King, 2013) Puzzle based on finding large prime numbers. Cunningham chain:p1, p2, ..., pn where pi+1 = 2pi - 1 each pi is large (probable) primep1 is divisible by H(prev mrklroot nonce) Primecoin Many of the largest known Cunningham chains have come from Primecoin miners. Q: Is this a hard problem? Q: Is this useful? Cryptocurrency Technologies Alternative Mining Puzzles 13 Recovering wasted Hardware Estimate: More than 100M spent on customized Bitcoin mining hardware This hardware investment is otherwise useless. Idea: How about a puzzle where hardware...

Trang 1

Basic features of Bitcoin’s puzzle

The puzzle is difficult to solve, so … but not too hard, so honest

Trang 2

• 

Trang 3

–  be –  have

–  have a chance of winning that is proportional to • Large player get only proportional

•  Even small players get proportional

Consider a puzzle that takes N

N

Trang 4

Problem: fastest miner always

Solution

Trang 6

Premise: the cost and performance of memory

Trang 8

Also requires N steps, N

Is it actually ASIC resistant

http://zeusminer.com/

Trang 9

Is there a cycle of size K? If so,

Cookoo Hash Cycles

Example of a memory hard puzzle that’s cheap to verify

Trang 10

• 

Trang 11

between 150 MW – 900 MW power consumed

Candidates –

– Protein folding – Search for aliens

Trang 12

Primecoin (Sunny King, 2013)

Puzzle based on finding large prime numbers

Trang 13

$100M spent on customized Bitcoin

This hardware investment is otherwise useless

Idea:

investment is useful, even if the work is

Permacoin – Mining with Storage (Miller et al., 2014)

Trang 14

Assume we have a large file F

For simplicity: F is chosen globally, at the

c) h1 selects k segments from subset

a)  Select a random nonce

b) h1 := H(prev || mrkl_root || PK || nonce)

Trang 15

The benefit must be a

Viable approaches include storage, prime-finding,

Trang 16

Premise: Bitcoin’s core value is

If power is consolidated in a few large pools, the

Position: Large pools should be discouraged

Trang 17

GHash.IO large mining

Trang 18

Pools only work because the “shares” protocol lets

members

Trang 19

Solution

discards

Trang 20

Whoever FINDS a solution spends the reward

–  searching for a solution requires SIGNING, not just

Trang 21

Solution

(prev, mrkl_root, nonce, PK, s1, s2)

Signature needed to

Second signature

Trang 22

This puzzle discourages all

Trang 23

Spend money on power and Earn mining

Spend money on power and Earn mining

Trang 24

•  Wealth outside Bitcoin has to move

Trang 25

Proof-of-Stake:“Stake” of a coin grows over time as long as the coin is

Proof-of-Deposit:can reclaim a coin

Proof-of-Activity:any coin

Q: Is there any security that can only be gained by

YES: Then “waste” is the

Trang 26

Many possible design goals

–  Prevent ASIC miners

–  Prevent large pools – 

–  Eliminate the need for mining hardware

Ngày đăng: 22/04/2024, 13:19

Xem thêm:

w