357 research outputs found

    Energy-recycling Blockchain with Proof-of-Deep-Learning

    Full text link
    An enormous amount of energy is wasted in Proofof-Work (PoW) mechanisms adopted by popular blockchain applications (e.g., PoW-based cryptocurrencies), because miners must conduct a large amount of computation. Owing to this, one serious rising concern is that the energy waste not only dilutes the value of the blockchain but also hinders its further application. In this paper, we propose a novel blockchain design that fully recycles the energy required for facilitating and maintaining it, which is re-invested to the computation of deep learning. We realize this by proposing Proof-of-Deep-Learning (PoDL) such that a valid proof for a new block can be generated if and only if a proper deep learning model is produced. We present a proof-of-concept design of PoDL that is compatible with the majority of the cryptocurrencies that are based on hash-based PoW mechanisms. Our benchmark and simulation results show that the proposed design is feasible for various popular cryptocurrencies such as Bitcoin, Bitcoin Cash, and Litecoin.Comment: 5 page

    Escalating The War On SPAM Through Practical POW Exchange

    Get PDF
    Proof-of-work (POW) schemes have been proposed in the past. One prominent system is HASHCASH (Back, 2002) which uses cryptographic puzzles . However, work by Laurie and Clayton (2004) has shown that for a uniform proof-of-work scheme on email to have an impact on SPAM, it would also be onerous enough to impact on senders of "legitimate" email. I suggest that a non-uniform proof-of-work scheme on email may be a solution to this problem, and describe a framework that has the potential to limit SPAM, without unduly penalising legitimate senders, and is constructed using only current SPAM filter technology, and a small change to the SMTP (Simple Mail Transfer Protocol). Specifically, I argue that it is possible to make sending SPAM 1,000 times more expensive than sending "legitimate" email (so called HAM). Also, unlike the system proposed by Debin Liu and Jean Camp (2006), it does not require the complications of maintaining a reputation system.Comment: To be presented at the IEEE Conference On Networking, Adelaide, Australia, November 19-21, 200

    Features of application the cryptographic algorithms in transmission of digital money for blockchain technologies

    Get PDF
    Останні роки спостерігається значний структурний вплив цифрової економіки на формування бізнес-процесів соціально-економічних об’єктів. Стрімкі зміни фінансового ринку тягнуть за собою впровадження інноваційних технологій блокчейна, що вимагає ретельного дослідження систем захисту, узгодженості апаратного та програмного забезпечення при проведенні грошових операцій з використанням крипто валют. Світовим трендом є вкладення в криптовалюту, яка є не чутливою до непередбачуваних змін соціально-економічного середовища будь-якої країни. У статті розглянуто особливості застосування криптографічних протоколів при проведенні транзакцій за технологіями блокчейна. Наведено переваги та недоліки найбільш популярних та використовуваних на будь-якій блокчейн платформі алгоритмів досягнення консенсусу за методикою доказу роботи, доказу володіння, визначення делегатів для проведення сеансу у біткоїн-платіжних системах.Последние годы наблюдается значительное структурный влияние цифровой экономики на формирование бизнес-процессов социально-экономических объектов. Стремительные изменения рынка влекут за собой внедрение ин-новационных технологий блокчейна, что требует тщательного исследова-ния систем защиты, согласованности аппаратного и программного обеспечения при проведении денежных операций с использованием крипто валют. Мировым трендом является вложения в криптовалюту, которая не чувствительна к непредсказуемым изменениям социально-экономической среды любой страны. В статье рассмотрены особенности применения криптографических протоколов при проведении транзакций по технологиям блокчейна. Приведены преимущества и недостатки наиболее популярных и используемых на любой блокчейн платформе алгоритмов достижения консенсуса по методике доказательства работы, доказательства владения, определение делегатов для проведения сеанса в биткоин-платежных системах.The current technological level of the Ukrainian economy cannot count on a large-scale launch of its products on the world markets, unless using the digitalization of business processes, introducing new innovative digital technologies to enterprises of any sphere of activity. In recent years, there has been a significant structural impact of the digital economy on the shaping of business processes of socio-economic entities. The rapid changes of the financial market entail the introduction of innovative blockchain technologies, which requires a careful study of security systems, consistency of hardware, and software in conducting money transactions using cryptocurrencies. The global trend is to invest in cryptocurrency, which is not sensitive to unpredictable changes in the socio-economic environment of any country. One of the fundamental calculations and analytical methodologies in conducting transactions with securities, digital money is economic and mathematical analysis, which in modern conditions should not only give an objective assessment in the part of securities transactions but also identify and mobilize reserves to increase them, the efficiency of the use of economic potential, to develop and make optimal management decisions. The article deals with the peculiarities of the application of cryptographic protocols in conducting transactions using blockchain technologies. The advantages and disadvantages are the most popular and used on any blockchain platform consensus algorithms by the method of proof of work, proof of ownership, determination of delegates for the session in bitcoin payment systems. The purpose of the article is to perform a comparative analysis of basic cryptographic protocols when using cryptocurrencies in blockchain technologies. In the development and implementation of protection systems, it is recommended to clearly state all the necessary assumptions and hypotheses, justify the results. The information security system interacts with the indicators of the internal and external environment, so this environment must meet certain conditions: explicitly and accurately indicate all the foreseen information security services (confidentiality, knowledge, authentication, inability to refuse, fixation) and explicitly distinguish individual cases of mathematical problems

    Factors that Impact Blockchain Scalability

    Get PDF

    Towards Application Portability on Blockchains

    Full text link
    We discuss the issue of what we call {\em incentive mismatch}, a fundamental problem with public blockchains supported by economic incentives. This is an open problem, but one potential solution is to make application portable. Portability is desirable for applications on private blockchains. Then, we present examples of middleware designs that enable application portability and, in particular, support migration between blockchains.Comment: Proc. IEEE HotICN 2018, August 201
    corecore