One of the key elements for the success of blockchain, whether it is a public chain or a private chain, is that the executors of the 51% attack (especially miners) must be credible. In theory, the more executors there are, the more credible the 51% attack is. However, a large number of Bitcoin developers (including Gregory Maxwell, Peter Todd, Luke-Jr, etc.) have shown that the Bitcoin mining industry is centralized and the computing power is in the hands of a very few people. With the invention of professional integrated circuits and the advent of economies of scale, large mining companies have chosen remote areas of China as their locations. This is because electricity is cheap there, which increases mining profits. Obviously, block mining rewards and transaction fees are more profitable than malicious 51% attacks. But as long as the risk of 51% attacks exists, it is not surprising that someone really uses it to do bad things. Recently, Shanghai Jiao Tong University and Virginia Commonwealth University in the United States jointly published a paper (full text download) aimed at solving malicious 51% attacks. The paper begins: Bitcoin cleverly uses the computing power of miners to ensure the security of the blockchain. Based on this, this paper proposes to use Bitcoin transactions in the hands of users to further improve network security. In other words, this scheme adds an extra layer of protection to the proof of work (PoW), which can also be called proof of stake (PoS). The paper analyzes the specific implementation methods of PoS and some application concepts, including Ethereum's Casper. The researchers said that the random number generator used by Casper is an extractor based on the previous state of the blockchain, in which the function is derived from the missing block proposition, so its data is controllable. In addition, researchers said that the current PoS mechanism will lock the currency, which can easily bring potential risks. The paper suggests not locking in currencies, but letting users choose the best blockchain:
The researchers say that combining the two mechanisms could effectively prevent malicious users in PoW and malicious miners in PoS. However, it is unclear whether this solution is actually feasible. |
What we call a broken palm in our daily life is a...
According to the official announcement, in order ...
A person's general fortune can also be judged...
Flat nose From the analysis of facial features, w...
Wang Xin, director of the Research Department of ...
WTIP coin, new virtual currency mining tutorial r...
Regarding FileCoin mining, the market is currentl...
The face of a man who has wealth but cannot keep ...
How to get rid of regulatory difficulties and com...
A person's image, good or bad, is naturally v...
On the coast of El Salvador lies a small rural be...
In today's era of booming digital content cre...
Recently, BitBays, a dual-currency Bitcoin exchan...
The world of emerging technologies such as Web3.0...
Preface UEBOT is a Bitcoin quantitative trading c...