0% found this document useful (0 votes)
31 views35 pages

CCBT Unit 3

Unit III of the document covers Bitcoin consensus mechanisms, primarily focusing on Proof of Work (PoW) and its alternatives such as Proof of Stake (PoS), Proof of Burn, and others. It discusses the importance of consensus in blockchain for building trust and security among users, detailing how various mechanisms validate transactions and their respective advantages and disadvantages. The document also highlights issues related to PoW, including the 51% attack and resource consumption, while emphasizing the role of miners and the mining process.

Uploaded by

sai kiran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views35 pages

CCBT Unit 3

Unit III of the document covers Bitcoin consensus mechanisms, primarily focusing on Proof of Work (PoW) and its alternatives such as Proof of Stake (PoS), Proof of Burn, and others. It discusses the importance of consensus in blockchain for building trust and security among users, detailing how various mechanisms validate transactions and their respective advantages and disadvantages. The document also highlights issues related to PoW, including the 51% attack and resource consumption, while emphasizing the role of miners and the mining process.

Uploaded by

sai kiran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 35

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

CCS339-CRYPTOCURRENCY AND BLOCKCHAIN


TECHNOLOGIES
(REGULATION-2021)

UNIT – III

Prepared by Verified by Approved by


Unit III

BITCOIN CONSENSUS

Bitcoin Consensus, Proof of Work (PoW)- Hashcash PoW , Bitcoin PoW, Attacks on
PoW ,monopoly problem- Proof of Stake- Proof of Burn – Proof of Elapsed Time –
Bitcoin Miner, Mining Difficulty, Mining Pool-Permissioned model and use cases.

Consensus in Blockchain

 Consensus plays a key role in building trust among crypto coin traders worldwide.

Due to the decentralized nature of the crypto world, it is essential to have complete

transparency while trading a particular coin.

 This minimizes the chances of a buyer becoming a victim of fraud.

What is the Meaning of Consensus?

 Generally, consensus means that the majority of a group has agreed in favor of a

decision. When it comes to blockchain, reaching a consensus is important.

 At least 51% of the traders and miners associated with a particular coin must agree

to finalize the next global status of the coin.


What is A Consensus Mechanism?

 In the blockchain, a consensus mechanism is a system that validates a transaction

and marks it as authentic.

 This mechanism lists all valid transactions of a coin in a blockchain to build trust in

the coin among traders.

 Several currencies, such as Bitcoin, Ethereum etc., use this system for security

purposes.

How Does The Consensus Mechanism Work?

 It achieves the agreement of most users on a single network. The consensus

mechanism maintains the security of the blockchain by keeping a record of all

legitimate transactions. Since crypto trading is a decentralized process, this becomes

important to stop sellers from deliberately cheating a buyer.

 To build trust for a blockchain, the consensus mechanism ensures that a transaction

is reflected in the blockchain as soon as it gets validated.

 There are a variety of methodologies that are essential to ensure security and trust

and achieve agreement across a blockchain network.

 Consensus mechanisms also ensure that all the transactions for a coin are rightly

listed in the blockchain.

What Are The Types Of Consensus Mechanisms?

Several mechanisms are used as a consensus mechanism during coin trading. These

mechanisms are as follows:


Proof of Work

 ‘Proof’ refers to the solution of a highly-complex problem, and ‘work’ refers to the

process of solving the same. Crypto coin miners compete to solve the problem and

gain the right to process the transaction.

 The fastest solver receives a mining fee from the traders of these coins. This

mechanism tracks and verifies the creation and transactions across blockchain

networks.

 It enables miners by allowing them to validate new transactions and is extremely

secure. However, it has several cons, such as high electricity requirements and

difficulty for individual miners.

Proof of Stake
 This mechanism randomly chooses a maximum coin owner to validate a transaction.

It also allows the owner to create a block for the same coin. This mechanism

requires comparatively less energy, transaction time and a lower fee.

 Coins like Etherium 2.0, Polkadot, Cosmos, Cardano, ThorChain, Nxt and Algorand

use this mechanism extensively.

 There is a security risk as if an owner owns 51% or more coins of a particular coin,

then that person will get sole ownership of its network.

Proof of Capacity

 The PoC mechanism heavily relies on free space available in the hard drive. This is

because there are many solutions to a coin's hash problem that a trader needs to

store.

 It is highly efficient as compared to PoW and PoC mechanisms. Coins such as Burst,

Storj, SpaceMint and Chia use these mechanisms.


Proof of Activity
 This mechanism is a combination of both Proof of Work and Proof of Stake. It has

been designed to combine the best features of PoW and PoS.

 In the beginning, the Proof-of-Activity mechanism functions like PoW. Once a new

block is completed, it starts to function like a Proof-Of-Stake mechanism. Coins such

as DCR (Decred) use this mechanism.

Proof of Authority
 Different organizations and private companies created this unique mechanism.

 There are validators with approved accounts which authorize transactions and the

creation of new blocks.

 These validators must disclose their true identity to get the right to validate a

transaction.

Proof of Burn
 PoB aims to improve the quality of blockchain so that it can be used easily and

extensively as a tool for faster and more secured transactions.

 After PoW and PoS, PoB is designed to prevent fraud activities on a blockchain

network. Cryptocurrencies such as Bitcoin use this mechanism to offer secure

transactions to traders.

Proof of Elapsed Time

 Intel Corporation created this mechanism to permit blockchain to decide the person

who will create the next block. It uses a lottery system to decide the next block

creator.

 Thus, it gives a fair chance to all traders to create the next block. It is an efficient

process involving utilizing lesser resources and low energy consumption.


What are the advantages of the consensus mechanism?

Consensus mechanisms offer several advantages, such as:

● No barriers to participation

Any crypto trader or miner across the globe can participate in a consensus mechanism.

There are few barriers to participation in a consensus for any crypto coin.

● Builds trust among users

Traders and miners of a particular coin across the globe must agree to approve a decision.

This, in turn, builds trust among the users.

● Establishes security

Consensus mechanisms maintain the transparency of trading for all coins. Thus, traders can

ensure that no fraud occurs during a transaction.

What are the disadvantages of the consensus mechanism?

The minor disadvantages of a consensus mechanism include:

● Severe chances of hacking

There lies a chance of hacking known as 51% hack, which stands out as a potential attack

on a consensus mechanism.

● Excessive use of electricity

There is a heavy requirement for electricity for the PoW mechanism to function.
 With very few associated disadvantages, the consensus mechanism is a great

security tool for a decentralized form of trade.

 This allows traders and miners across the globe to establish a connection and trust

among themselves and benefit from the mechanism.

 The benefits in the case of traders are trade security and faster transactions. On the

other hand, miners get several rewards for solving complex problems faster and

gaining authority to validate a trade.

Proof of Work Mechanism (POW)

 Satoshi Nakamoto applied the bitcoin white paper with the concept of Proof of Work

(PoW) in 2008, which was first published by Bonneau et al.

 Cynthia Dwork and Moni Naor in 1993. The most popular consensus mechanism for

cryptocurrency is the Proof of Work.

 In 1999, the term “Proof of Work” was initially used by Markus Jakobsson and Ari

Juels The principle followed here is “Easy to verify but difficult to find”. Principle: A

solution that is easy to verify but difficult to find

A. Miners

 The process of solving the crypto puzzle is called mining . The mining activity

performed by the node in the network is named as minor.

 Then the new block is added to the blockchain problem (crypto puzzle) which is

considered as the solution that is difficult to find but it is easily verified.


B. Mining Pool
 For finding the new blocks, the amount of work done by the miners over a network

with the shared processing power equally in the pooling of resources are the mining

pool. The members in the mining pool are awarded with the amount of “Share,” who

provides the partial verified Proof of Work.

 The difficulty level for the minors is increased for mining in the pools where it takes

more time for the slower miners to create a block

 Rather than randomly finding once few years, it is better to get rewards for every

newly generated block. This is the solution for the problem to the miners to pool in

their resources.

C. Solving the Crypto Puzzle

The puzzle is solved by guessing at random hash value. Predicting the output is made

impossible by using the hash function.

For that difficulty, the minors choose the value randomly and apply it to the hash function

and the data in a particular block.

The number of zeros that are pre-established will be the starting for the resulting hash.
 There may be many results with the combination of two consecutive integers and it

leads to numbers that are impossible to find. Now, what to do if there is more than

one nonce produced? (all minors trying for the same block).

 In the peer to peer network solves the crypto puzzle or finds the hash within the time

period and the announcement takes place.

 Then the other miners will stop their work and go for the next nodes to solve the

crypto puzzle. As a result, the miners will be rewarded as they get new bitcoins for

solving the puzzle.

Cryptography SHA-256

Cryptography Major Role in Proof of Work SHA 256 is the most popularly used Proof of

Work consensus and was announced as the portion of the Bitcoin. [1] The others were

SCRYPT, SHA-3, SCRYPT JANE, SCRYPT-N, etc.

With the help of the hash value, the miners try to find the random nonce (random data of
small size) and find the block that holds the hash (of binary values) with number of zeros
that has the rare hashes to find. If it’s a good hash, the data is not found and have to try
many times to find a perfect nonce . The number of zeros were based on the difficulty faced
by the miners to search for a perfect block. For every 10 min, a new block is created by an
average of how many blocks that are previously added to it.
B. Nonce
 The cryptocurrencies and the blockchain are working under the mining algorithm
like Proof of Work with the concept of the central part as nonce . A nonce, which
produces the hash which is lower than or equal to the hash value is fixed by the
network as difficult. For finding these values the miners do mining and compete with
each other.
 In that network, the miner who finds a nonce is named as the golden nonce. Then the
miner gets the reward and adds that block to the blockchain network. It all happens
during the Proof of Work mining. Now let us see how the process of nonce is
done in mining.
C. Building Blocks with Nonce

Like timestamp and the difficulty target, the block header stays with its key data value. A
key with 32-bit in the block is the nonce .For creating a new block, the miners choose a
random nonce and add it to the block header while building a block. As stated before in
nonce, if the miners are not having the number of zeros, then they avoid the hash and go for
the new nonce. It will be repeated until a nonce is discovered by the miners.

D. Block Reward

Every block that is mined successfully by the miners in the blockchain network are
rewarded with the Bitcoin block.
• The number of bitcoins a miner gets, is the number of rewards that miner mines a block.
• The reward becomes half for every four years or every 210,000 blocks.
• The expected reward that hit be zero to around 2140 E.
Concept of Block Reward
The size of every bitcoin block is 1 MB and holds the data of transaction information.
Illustration, when a transaction occurs between two nodes in the network and information
about transaction are stored in a block .
At the initial stage (in 2009), for each and every bitcoin block was rewarded as a worth of
50 BTC (bitcoin). In February 2019, its reward was 12.5 BTC for one block and bitcoin price
is $3500, which is of 12.5 × 3500 = $42,000.
The block rewards were given to the miners those who do mining by using their
computation powers to find a new block .
Similarly, the other cryptocurrencies in the blockchain have the same mechanism for
rewarding the miners. The miner who wins the block reward adds the first transaction on
the block.

Main Issues with Proof of Work Consensus

The following are some of the issues for the Proof of Work consensus mechanism.
A. The 51% Attack : In the blockchain network, if any node gains 51% or more than 51%,
[8] the nodes could influence the blockchain by gathering most of the network Time
consuming: for solving the crypto puzzle, the miners have to check for the nonce which
must be solved to mine the block. This helps in time consumption.

• Resource consumption: In order to solve the mathematical crypto puzzle, the miners
consume high computational power. This results in wastage of resources like hardware,
space, money, and energy. It is estimated that the world’s electricity spent for verifying
transactions in 2018 was 0.3%.
It takes a minimum of 10–60 min for the confirmation of
any of the transactions in the blockchain network. This is due to the time taken for mining
the transactions and adding it to the blockchain. B. Computation Power

• Carbon footprint: 34.73 Mt CO2 In comparison with the carbon footprint of Denmark
over 723,140 VISA transactions with 48,872 h of time watching YouTube.

• Electrical Energy: 73.12 TWh In comparison with the power consumption of Austria, the
equivalent power consumption has an average of over 20.61 days in US as shown in Fig. 4.

• Electronic Waste: 11.49 kt In comparison with the e-waste generation of Luxembourg, as


shown in Fig. 4, the equivalent weight of 1.48 “C”-size batteries or golf balls around 2.09

C. Definition of 51% Attack This attack on blockchain is the 51% attack. [15] Usually the
bitcoins, the attacks which are mainly by a group of miners who control more than 50% of
the mining hash in the network or by the computational power. The ability as shown in
Table 2, of the attackers is to prevent the transactions that gain confirmations and can halt
the payments between the users [19]. They can also reverse the completed transactions of
any user in the network and this leads to Double Spend coins. The attackers could not alter
old blocks or create new coins in the blockchain-based cryptocurrency.

D. Double–Spending The risk at which the spending of digital currency is twice is called
Double spending. The savvy individuals, who understand about the blockchain network
and the computational power needed were reproduced to obtain the digital currencies that
are unique potential problem [15]. This type of issue will not happen during the cash
transactions, the parties involving in transactions can easily verify the authenticity and the
ownership of the physical currency. But in digital currency, the digital token can be copied
by the holder and it might be sent to any of the parties or the merchants with the original
one.
E. Proof of Work System Features

The two features that could contribute to the widespread of the consensus protocol are
• It is difficult to do the mathematical crypto puzzle problem.
• The correctness of the solution could be easily verified.

Consensus Protocols Proof of Stake [Pos]

The complete virtual consensus mechanism was made by the Proof of Stake. The way of
achieving the goal differs and the process remains the same as proof of work. While in PoW,
the miners solve the mathematical crypto puzzle with the help of the high computing
resources.

A. Validators

 The validators will be there in PoS instead of miners in PoW . In the ecosystem, the
validators lock some of their Ether as a stake.
 Like betting, the validators, will bet on those blocks that are likely to be added in the
chain. In proportion to the stake, the validators will be rewarded when a new block
is added.

1. One who becomes a validator may hold the cryptocurrency and also sometimes locked
up deposits were required.
2. It is also done based on how much stake or cryptocurrency the validators having are the
chances to mine a new block.
3. In the PoS protocol, it will randomly assign the validator and give the right to create a
new block in between as shown in Fig. 5, the validators and that is based on the stake value.
4. The reward, will be provided for the chosen validator. The Proof of Stake is mainly
suitable for resolving the BFT (Byzantine Fault Tolerance) as the
validators were tracked in the network and the known identities.

For example, the list wallet address. In Byzantine Fault Tolerance, it requires 2/3 of the
validators to be honest and keeping all these individuals helps to maintain the status.

B. Advantage

• Efficiency in energy

The PoS algorithms were efficient in energy in comparison with PoW [13]. The mining
process in PoS makes it a greener option in cutting out the energy intensively.

• Security

For security in PoS, the attackers should proceed with their stakes and the assets in order
to attempt 51% attacks. In comparison with PoW, the attackers will not lose their hardware
when attempting the 51% attacks.

• Decentralization
Leading to the real threat of centralization, the group of miners mining their resources
(mining pool), could control over 51% [15] of the networks that are running in PoW
systems. As a result, there is an exponential increase in the reward for a single investment
in PoW system because of opposition in the linear increase in the PoS system. For an
example, if the validator in a PoS network invests twice as much as any other validator, they
will be granted the control.

C. Conclusion

The PoS made the validators not to have their own computing power as the factors that
may influence the validators to win a number of their own coins and the complexity of the
network. The benefits that switching from PoW to PoS are as follows.
• Savings in energy
• If it becomes highly expensive, there will be a safer network.

Proof of Burn in the blockchain is a consensus algorithm

Proof of Burn in the blockchain is a consensus algorithm that allows miners to add
their block by sending some of their coins to an unspendable account. Let's understand
more!

We’ve previously discussed several renowned consensus algorithms like proof of work
(PoW), Proof of Stake (PoS), Proof of Capacity (PoC), and many more. Today we picked up
the Proof of Burn (PoB) consensus mechanism in Blockchain.

The Blockchain network uses a consensus mechanism to ensure that all participants agree
to a new update on the network. Such as adding a new block of transactions to the network,
deciding the network rights, etc. Therefore, to ensure the continuity of the network
algorithm needs to be established.

Table of Content

● What is Proof of Burn (PoB)?


● How does the PoB Algorithm work?
● Benefits of PoB
● Limitations of PoB
What is Proof of Burn (PoB)?

In the Proof of Burn (PoB) algorithm, miners reach a consensus by burning the coins.
It’s a process in which crypto coins get permanently eliminated from regular
circulation. In such cases, the burning of coins mechanism is used to validate transactions.
Hence, the more coins a miner burns, the higher the chances of adding the block to the
network.

In comparison to the proof of Work (PoW) system, PoB reduces energy consumption.
Moreover, compared with proof of stake (PoS) systems, PoB doesn’t need miners to stake
coins to add a new block to the network.

There are various versions of Proof of Burn in blockchain, with the most acknowledged
version being Iain Stewart’s algorithm. He’s also the inventor of the Proof of Burn
consensus mechanism.

Here, the concept of “burning the coins” means investing the native coins in virtual
mining rigs (mining powers). It allows miners with the most virtual mining rigs or a
miner who invested the most coins – to add his new block of transactions to the network.
Hence, the number of burnt coins shows miners’ commitment to the network.

Let’s see how the proof of burn consensus algorithm in the blockchain works?

How does the PoB Algorithm work?

First, let’s begin with how do the miners burn the coins?

Here, the miners transfer some amount of coins to an unspendable address or an escrow
account. These publicly verified unspendable accounts are randomly created with no
private keys associated. Once coins get received by burn address/accounts, it becomes
useless and inaccessible. Eventually, the burnt coins in the account are used for
strengthening the security of the network.
Let’s take an example to understand the working of proof of Burn (PoB)?

We have 6 miners, each having their own block of transactions. As per the process, the
miners have to burn some amount of coins to get an opportunity to add their block to the
network.

See the below diagram. Each miner sends some of their coins to the burn address or
unspendable escrow account.

John wins as he burns the maximum number of coins. Hence, he gets the chance to add his
block of transactions to the network.

Moreover, the block added by John will be verified by other network validators. If the block
is found invalid, then the second-highest (Ross) gets the chance to add a new block.

Wouldn’t this approach be unfair for early adopters in the network?

Proof of Burn in blockchain promotes the periodic burning of coins to avoid partiality
among new and old network participants. It means the virtual power of mining reduces
each time a new block gets mined. Moreover, it motivates miners to make regular
transactions instead of just one-time investments.

Now let’s jump to the pros and cons of using the PoB approach.

Benefits of PoB

Following are the advantages of Proof of Burn in blockchain:

● Less power and energy consumption.


● Motivates miners to make regular transactions using cryptocurrency.
● PoB is more sustainable and doesn’t need hardware for heavy computation.
● Used for long-term commitments

Limitations of PoB

Following are the disadvantages of Proof of Burn in blockchain:

● It’s not an initial consensus algorithm. It requires a number of wealthy


participants to burn their coins in the network.
● PoB has not been proven to be applied on massive networks.
● It takes more time to validate the block of transactions. Hence, a bit slower
mechanism.

Conclusion

The above article covered the details of the proof of Burn (PoB) mechanism. It also covered
the working of PoB and how it is better than popular consensus mechanisms like PoW and
PoS. Moreover, it goes through the pros and cons of the PoB algorithm.
Proof of Elapsed

Proof of Elapsed Time in blockchain uses a time-lottery-based consensus mechanism,


distributing wait time to each participating node in the network. Let's understand
more!

In this series covering consensus mechanisms used by blockchain networks, today, we


picked up Proof of Elapsed time (PoET). It is the algorithm behind the Hyperledger
permissioned blockchain network for businesses.

Table of Content

● What is Proof of Elapsed Time (PoET)?


● How does the Proof of Elapsed Time (PoET) Algorithm work?
● Proof of Work (PoW) VS Proof of Elapsed Time (PoET)
● Benefits of Proof of Elapsed Time (PoET)
● Limitations of Proof of Elapsed Time (PoET)

What is Proof of Elapsed Time (PoET)?

PoET is a consensus algorithm used in a permissioned blockchain network to decide on


mining rights and the next block miner. FYI, a permissioned blockchain network requires
participants to prove their identity and whether they are allowed to join. Hence, it needs
permission (or invitation) to join the decentralized network as a new participant ( or node).

The PoET algorithm was developed by Intel Corporation, the processor chip giant, in early
2016. Intel associated with the Linux Foundation in the development of Hyperledger
Sawtooth. They aimed to build a highly scalable private blockchain network.
PoET Mechanism assigns an amount of time to each node in the network randomly. The
node must sleep or do another task for that random wait time. Whichever node gets
the shortest waiting time wakes up and add their block to the network. Later, the new
update information floods among other network participants.

The Proof of Elapsed time in blockchain needs to ensure 3 significant factors for this
process to work:

● Ensure that the node or network participant gets the random waiting time.
● Check if they are not choosing the shortest waiting time on purpose.
● Verify if the node has completed the given waiting time or not.

Let’s dig a bit deeper into working on the Proof of Elapsed Time mechanism.

How does the Proof of Elapsed Time (PoET) Algorithm work?

The time-lottery concept allows everyone in the network an equal chance of winning the
reward and being able to forge a new block to the network. The PoET controller maintains a
stopwatch for each participating node. It ensures their waiting time ends, and now they can
forge a new block. When the node wakes up, it submits the block and a cryptographic test
to the PoET controller for verification.

A newly proposed block is selected if the controller approves the newly proposed block by
the first woken-up node. Otherwise, it gets discarded. And then, the selection process of
assigning waiting time starts again.

Let’s break down the process more accurately into

steps.

Selection Process
● First, each participating node has to share its certificate by Intel Software Guard
Extension (SGX), which ensures its validity to generate a new block in the
network. After that, they are eligible to get a timer object.
● The numbers are assigned to each node as a timer object (waiting countdown
time) by Intel’s random number generation instruction, RAND. It generates
difficult-to-detect random numbers.
● Now, the time object given to each participating node activates.

Generation Process

● After the time object ends and the node wakes up, it’s eligible to forge a new block
to the network.
● The active node generates the hash (using a hash function like SHA-256) of its
block of transactions and submits it for acceptance. It doesn’t require showing
computation work done by the node.
● Afterwards, the update gets flooded to the network.
Therefore ends the iteration of mining a new block in a permissioned blockchain network
using the PoET consensus mechanism.

Proof of Work (PoW) VS Proof of Elapsed Time (PoET)

Proof of Work (PoW) demands computation work from nodes (or miners) to become
eligible for adding a new block. On the other hand, PoET randomly selects the among
participating nodes by distributing waiting time objects. Here, each node is equally eligible
to mine a new block.

PoET is way more time and energy-efficient than PoW. It is backed by one of the renowned
technology giants, Intel corporation, which makes it more trusting and reliable.

Benefits of Proof of Elapsed Time (PoET)

Following are the advantages of the PoET consensus mechanism:

● PoET can go up to a million transactions per second.


● It is highly energy-efficient and easily scalable.
● It’s a block generation consensus algorithm, unlike proof of stake (PoS).
● PoET is for privately controlled spaces like business organizations.
● It ensures the same opportunity for network participants with time object and
activation.
● As it’s a permissioned blockchain network, the process of selecting validators
ensures network security against cyber attacks.
Limitations of Proof of Elapsed Time (PoET)

The following are the disadvantages of the PoET consensus mechanism:

● PoET is a permissioned and closed network, unlike Bitcoin and Ethereum.


● The mechanism highly depends on tools by Intel technology which might raise
compatibility issues with other tools later.

You can also read about Digital Signing in Blockchain using Cryptography.

Conclusion

The above article covered the PoET algorithm and its working. It also compares the
difference between Proof of Work (PoW) and Proof of Elapsed Time (PoET). Moreover, it
adds to the benefits and limitations of the PoET consensus algorithm.

The decentralized network works on the principle of not trusting but staying cooperative.
Blockchain (a decentralized network) chain of linearly connected information-contained
blocks secured using cryptography. Here, each block contains the hash of its previous block
to keep connected.

Moreover, every block contains several other pieces of information like timestamp, block
height, transaction records, Merkle Root Hash, block hash, previous block hash, difficulty
level, and many more in the block header. The other section contains a set of financial
transactions whose hashes will eventually convert into the Merkle root. Hence, a blockchain
is a chain of blocks of transactions.

Mining a Block
When it comes to adding a new block to the chain, it’s seen as a new update to the current
system. Therefore, it requires network participants’ permission. To decide to add a new
block or not, Proof-of-Work (PoW), a consensus mechanism, is used. Only verified
transactions get added to the network.

In contrast, not all blocks are valid. Most proposed blocks are considered invalid by the
network. The Blockchain protocol defines the Block validity. A Blockchain network has an
arbitrary “Difficulty” setting managed by the protocol, which changes how hard it is to mine
a block. Here, mining means adding a new block.

Miners propose the new blocks in the chain. They are externals who wish to add their block
to the network. The work required to create a valid block is where the value comes from.
Miners receive rewards in proportion to their share of the computation power they spend
to mine a new block. By mining a valid block, the miner proves the work done.

In Blockchains like the Bitcoin network or Ethereum, the difficulty level can change to
ensure that blocks are created regularly.

Block Hash < Difficulty Hash

A block contains crucial transaction information that can’t be changed. So, the Miners
change the nonce to get the hash lower than the difficulty threshold. The nonce is a block
component that can be altered to achieve difficulty-level restrictions.

Let’s take an example to understand how it works.


Harry is a Bitcoin miner who wishes to add his block of Bitcoin (a digital currency)
transactions to the network. However, to make his block valid. First, he has to change the
block nonce until the hash of his block gets lower than the difficulty threshold.

Let’s say,

Harry’s block Hash: 817de9e0c

Difficulty Hash: 001000000

Nonce: 8263

For, this, Block Hash > Difficulty Hash, which is considered invalid.

817de9e0c1 > 001000000

Harry will change the nonce until he gets the first 3 digits as zeroes.

After continuously changing nonce for hours, he finally got the hash.

Harry’s block Hash: 000383ec5

Difficulty Hash: 001000000

Nonce: 6778
Now, the difficulty threshold got achieved. Block Hash < Difficulty Hash.

Hence, Harry’s block will be marked as valid and will get added to the blockchain. Harry
gets a few bitcoins as block rewards for mining a block in the bitcoin blockchain for
spending the computation power to find the valid hash.

This process is entirely based on chance. Hence, the miner’s job is to change the nonce
value until the overall block hash reaches lower than the difficulty hash. There are other
responsibilities of miners, but that’s a topic for another article.

What Is a Mining Pool?

A mining pool is a group of cryptocurrency miners who connect their mining machines over
a network to boost their chances of earning the reward for opening a new block.

New blocks are opened when a miner discovers the solution to the problem the entire
blockchain network is trying to solve. This process is time-consuming, energy-intensive,
and requires a computer that can generate and check billions, or even better, trillions of
randomized hexadecimal numbers per second.

Because it can take years to become profitable after purchasing, running, cooling, and
maintaining mining machines capable of this, joining a mining pool is the most affordable
way to increase the odds of receiving a bitcoin reward.

KEY TAKEAWAYS
● Cryptocurrency mining pools are groups of miners who share their computational
resources.
● Mining pools utilize these combined resources to increase the chances of
successfully mining for cryptocurrency.
● If the mining pool is successful and receives a reward, that reward is divided among
participants in the pool.

How a Mining Pool Works


Individually, participants in a mining pool contribute their processing power toward the
effort of finding a block. If the pool is successful in these efforts, they receive a reward,
typically in the form of the associated cryptocurrency.

Rewards are usually divided between the individuals who contributed, according to the
proportion of each individual's processing power or work relative to the whole group,
usually called shares. In most cases, individual miners show proof to receive their
rewards—this is generally completed by the software the individual miner is using as it
attempts to generate solutions for the pool.

Rewards are usually split among the miners based on the pool's payout scheme. Some
schemes are pay per share (PPS), pay per last N shares (PPLNS), and pay per share plus
(PPS+). Each pays based on the share of work contributed, with different payout
calculations for each type.

Mining Pool Methods


Not all cryptocurrency mining pools function in the same way. However, there are a few
common protocols that govern many of the most popular mining pools.

Proportional mining pools are among the most common. In this type of pool, miners
contributing to the pool's processing power send shares of work to the pool until the point
at which the pool succeeds in finding a block. Miners then receive rewards proportional to
the number of shares they submitted for that block.

Peer-to-peer mining pools aim to prevent the pool structure from becoming centralized. As
such, they integrate a separate blockchain related to the pool itself and are designed to
prevent the pool operators from cheating and the pool itself from failing due to a single
central issue.

Payout Schemes
There have been many different types of payout schemes tried by many pools in the past,
but the majority of pools now use one of four:

● Pay-Per-Share (PPS)
● Full-Pay-Per-Share (FPPS)
● Pay-Per-Share-Plus (PPS+)
● Pay-Per-Last-N-Shares (PPLNS)

PPS is a fairly simple payout method—you're paid for the shares or blocks you contribute to
the pool.
PPS+ and FPPS are generally the same thing—you receive a proportional amount of the
reward based on the quality of the shares you provided, and the pool pays a transaction fee
reward.

PPLNS might be slightly more confusing—when a block is "found," the pool software
locates the last blocks you contributed after the last and new winning blocks were found.
The number of trial blocks (or shares) you contributed between that time dictates your
payout. This usually means you'll need to stay connected to the pool until a block is found. If
you disconnect between blocks, you'll likely lose your contributions and payout.

Benefits of a Mining Pool


While success in individual mining grants complete ownership of the reward, the odds of
achieving success are very low because of high power and resource requirements. Mining is
often not a profitable venture if you're solo. Many cryptocurrencies have become
increasingly difficult to mine and the competition for mineable cryptocurrencies has
increased tremendously. Mining pools give everyone a fighting chance against (or to work
with) those who have built vast, ultra-expensive mining farms.

Mining also pools require less of each participant in terms of hardware and electricity costs,
thus increasing the chances of paying any associated expenses and profiting.

Disadvantages of a Mining Pool


By taking part in a mining pool, individuals give up some of their autonomy in the mining
process. They are typically bound by terms set by the pool itself, which may dictate how the
mining process is approached. They are also required to divide up any potential rewards,
meaning that the share of earnings is lower for an individual participating in a pool.
A small number of mining pools—AntPool, Foundry, ViaBTC, F2Pool, and Binance
Pool—dominate the Bitcoin mining process, according to Blockchain.com.1 Although many
pools try to be decentralized, these groups consolidate much of the Bitcoin blockchain.

For some cryptocurrency proponents, this centralization goes against the intended
decentralized structure Bitcoin and other cryptocurrencies are supposed to represent.

Are Mining Pools Profitable?


It depends on how much you've paid for equipment, the pool you join, its payout method,
and your work contribution. In general, the more work you do when the pool earns
cryptocurrency, the more you receive.

Is It Worth Joining a Crypto Mining Pool?


If you want to mine cryptocurrency for the chance to earn rewards, it's best to join a pool.
This is due to the competitive nature of mining, so the more hashing power you're part of,
the more chance you have. On your own, it's doubtful you'll hash fast enough to keep up
with the rest of the network.

How Long Does It Take to Mine 1 BTC?


It takes about 10 minutes for the solution for one block to be found. The reward in 2023 is
6.25 BTC per block, so 6.25 BTC is awarded about every 10 minutes. This is an average of
about 1.6 minutes per 1 BTC. Sometime in mid-2024, the reward will halve to 3.125 BTC
per block and average about 3.2 minutes per 1 BTC.

The Bottom Line


Because Bitcoin mining and rewards are based on who finds the solution first, the network
has become dominated by a few large groups. These Bitcoin mining pools are generally the
only way a solo or smaller hash-rate miner can earn bitcoin because they hash at a
significantly higher rate.
If you're looking into Bitcoin mining to supplement your income or earn some as an
investment, it is worth joining a pool to reduce your overall costs and increase your
chances. Be sure to investigate and understand their payout schemes and requirements
before jumping into the pool.

Permissioned Blockchain

A permissioned blockchain is a controlled and private network where access to participate


and view the data is restricted to authorized entities. They are employed by organizations
and groups that require enhanced control, privacy, and security over their blockchain
activities. The governance for this blockchain is managed by a consortium of trusted
participants who collectively determine network rules, consensus mechanisms, and overall
management. These entities rigorously control access, using methods like digital
certificates or cryptographic keys to ensure that only the approved users can engage with
the network.

These blockchains often employ efficient mechanisms like practical Byzantine fault
tolerance (PBFT), delegated proof of stake (DPoS), or Raft consensus. Thus, it enables
faster transaction validation and reduced energy consumption. Additionally, these
blockchains efficiently safeguard privacy and confidentiality, a crucial requirement for
industries where sensitive information must be kept confidential. Moreover, these
blockchains support smart contracts, which reduces the need for intermediaries and
optimizes operational efficiency.

Characteristics

The characteristics of permissioned blockchain are:


● Access Control: These blockchains have strict access control. Only authorized users
are allowed to join the network. Access can be controlled through digital certificates,
cryptographic keys, or other authentication methods. Thus, it ensures that the
network is limited to known and trusted participants.
● Network Governance: They are typically governed by a group of trusted entities.
These users collectively decide on network rules, consensus mechanisms, and
governance. Hence, these blockchains have a more centralized governance structure.
● Consensus Mechanisms: Such blockchains use consensus mechanisms to validate
transactions and maintain the ledger’s integrity. They often employ more efficient
consensus mechanisms. As a result, these mechanisms enable faster transaction
validation and lower energy consumption.
● Privacy and Confidentiality: Enhanced privacy and confidentiality are significant
characteristics of permissioned blockchain. Users have greater control over who can
access their data and transactions. Thus, it is crucial for industries where sensitive
information must be kept confidential.

● Smart Contracts: Many such blockchains support smart contracts, self-executing


code that automates processes and agreements when predefined conditions are met.
Smart contracts can streamline complex business processes, reduce the need for
intermediaries, and enhance operational efficiency.

Use Cases

Some permissioned blockchain use cases include:

● Banks and financial institutions use these blockchains to facilitate faster and
cost-effective cross-border payments and settlements. They streamline trade and
finance processes, reducing fraud and improving transparency in international
trade transactions.
● Companies in the food, pharmaceutical, and luxury goods industries use these
blockchains to track the origin and journey of products, ensuring authenticity and
compliance with regulations. They help manage inventory levels, automate reorder
processes, and enhance supply chain visibility.
● Healthcare providers use such blockchains to securely and efficiently manage
patient records, ensuring data privacy and integrity. Moreover, the pharmaceutical
industry employs them to trace the production and distribution of medications,
reducing the risk of counterfeit drugs.
● One of the crucial permissioned blockchain use cases is to develop secure and
transparent electronic voting systems, reducing the potential for fraud. Additionally,
Governments can use these blockchains for identity verification, enhancing security
in passport issuance and border control areas.
● They help artists and creaators protect their intellectual property rights by
transparently recording ownership and usage rights. Furthermore, legal firms and
businesses use these blockchains to automate contract execution and ensure
compliance.

● Educational institutions utilize these blockchains to verify and share academic


credentials securely. It aids in reducing fraud in the hiring process.

Advantages And Disadvantages

The advantages of Permissioned blockchains are as follows:

● They provide a higher degree of privacy and security. Access is restricted to


authorized users, reducing the risk of data exposure and unauthorized transactions.
It benefits industries like healthcare and finance, where sensitive data and
regulatory compliance are critical.
● A select group of trusted entities governs these blockchains. This centralized
governance structure enables quicker decision-making and facilitates network
management.
● This blockchain often employs efficient consensus that offers faster transaction
processing and requires less computational power, making it suitable for high-speed
transactions where low latency is crucial.

● Due to controlled participation and efficient consensus, these blockchains can


handle more transactions per second, making them scalable for enterprise-level
applications.

The disadvantages of Permissioned blockchains are:

● They are often criticized for being less decentralized than public blockchains. The
control and governance by a select group of participants can lead to concerns about
centralization. This centralized control can undermine the fundamental principles of
blockchain technology.
● Since these blockchains have fewer participants, they may be more susceptible to
collusion or attacks from within the network. The network’s security relies heavily
on the trustworthiness of the participants and makes it vulnerable if any participant
becomes compromised or malicious.
● Building and maintaining this blockchain can be expensive because of its initial
development costs and ongoing operational expenses. Smaller organizations and
startups may find it challenging to invest in the infrastructure and resources
required for these blockchains.

● They have restricted access, which limits the network effects and potential benefits
that can be achieved from a more extensive, open network. In contrast, the smaller
networks may not offer the same innovation, liquidity, and ecosystem growth level.

Permissioned Blockchain vs Permissionless Blockchain

The differences between the two are as follows:

Permissioned Blockchain
● In these blockchains, access to the network and participation is restricted to
authorized entities or participants who are granted permission. This controlled
access allows for higher privacy, security, and regulatory compliance, making it
suitable for applications where data access must be limited to trusted parties.
● These blockchains often have a more centralized governance model, with a select
group of entities or consortium members making network rules and operations
decisions.

● Thus, it prioritizes privacy and confidentiality by limiting data access to authorized


participants and allowing for confidential transactions.

Permissionless Blockchain

● Permissionless blockchains are open to anyone who wants to participate without


permission or approval. This open access promotes inclusivity, censorship
resistance, and global participation. It aligns with the principles of decentralization.
● These blockchains are characterized by a high degree of decentralization, where no
single entity or group controls the network.

● Thus, this blockchain prioritizes transparency, as anyone can view the transaction
history and ledger contents.

You might also like