Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3211933.3211943acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

Conquering Generals: an NP-Hard Proof of Useful Work

Published: 15 June 2018 Publication History
  • Get Citation Alerts
  • Abstract

    Proof of Work systems are used in cryptocurrencies to obtain consensus in distributed peer-to-peer systems that share no trust. Miners of cryptocurrency compete by engaging in the Proof of Work to solve a cryptographic challenge. The first to successfully provide a solution to the challenge wins by minting new currency. The process of mining also simultaneously prevents double-spending through the creation of an append-only distributed database known as the blockchain. The most widely adopted Proof of Work is the Hashcash scheme and the most widely deployed miners are ASIC-based. Despite the popularity of Hashcash, two issues are commonly identified its use. Firstly, the high energy consumption of the scheme is perceived as wasteful because the solutions found provide no useful output, and secondly, the computational complexity class of the scheme is not formally known. Based on these deficiencies, we propose a novel Proof of Work system which achieves the following goals:
    - to provide a fiscally incentivized platform for algorithm research that aims to optimize an NP-Hard computational problem. This provides indirect insight into the P Versus NP Clay Institute Millennium problem, thus providing useful output.
    - to construct a challenge within a known hard computational complexity class.
    - to ensure the Proof of Work created is inclusive of ASIC hardware. Our proposal is a hybrid Proof of Work system that initially uses the Hashcash scheme and which subsequently constructs an instance of the NP-Hard Travelling Salesman Problem. We build on the ambitions of others to develop Proofs of Useful Work. We differentiate our paper from related work as the first to consider the current capital investment into ASIC hardware, thus including them in our proposal.

    References

    [1]
    A. Antonopoulos. 2017. Mastering Bitcoin: Unlocking Digital Cryptocurrencies (2 ed.). O'Reilly Media, Sebastopol, CA, USA.
    [2]
    A. Back. 2002. Hashcash - A Denial of Service Counter-Measure. http://www.hashcash.org/hashcash.pdf
    [3]
    M. Ball, A. Rosen, M. Sabin, and P. Nalini Vasudevan. 2017. Proofs of Useful Work. https://eprint.iacr.org/2017/203.pdf
    [4]
    Bitnodes. 2018. Global Bitcoin Nodes Distribution. https://bitnodes.earn.com/
    [5]
    Blockchain.info. 2018. Bitcoin Hash Rate. https://blockchain.info/charts/hash-rate
    [6]
    Buybitcoinworldwide.com. 2018. Bitcoin Mining Hardware Comparison. https://www.buybitcoinworldwide.com/mining/hardware
    [7]
    Coin Market Cap. 2018. CryptoCurrency Market Capitalizations. https://coinmarketcap.com
    [8]
    C. Chantrill. 2018. State Spending for Arkansas. https://www.usgovernmentspending.com/year_spending_2018ARbs_19bs2n
    [9]
    D. Chaum. 1983. Blind Signatures for Untraceable Payments. In Advances in Cryptology: Proceedings of Crypto 82 (CRYPTO '82). Springer, Boston, MA, Santa Barbara, CA, USA, 199--204.
    [10]
    W. Cook. 2016. Concorde TSP Solver. http://www.math.uwaterloo.ca/tsp/concorde.html
    [11]
    T. Cormen, C. Leiserson, R. Rivest, and C. Stein. 2009. Introduction to Algorithms, Third Edition (3 ed.). MIT Press, Cambridge, MA, USA.
    [12]
    W.Dai. 1998. b-money. http://www.weidai.com/bmoney.txt
    [13]
    O. Deutsch, N.R. Schiff, D. Dolev, and M. Schapira. 2018. Preventing (Network) Time Travel with Chronos. In Network and Distributed Systems Security Symposium (Proceedings of NDSS 2018). San Diego, CA, USA.
    [14]
    Digiconomist. 2018. Bitcoin Energy Consumption Index. https://digiconomist.net/bitcoin-energy-consumption
    [15]
    C. Dwork and M. Naor. 1993. Pricing via Processing or Combatting Junk Mail. In Advances in Cryptology: Proceedings of Crypto 92 (CRYPTO '92). Springer, Berlin, Heidelberg, Santa Barbara, CA, USA, 139--147.
    [16]
    H.Finney. 1993. Digital Cash and Privacy. http://fennetic.net/irc/finney.org/~hal/dig_cash_priv.html
    [17]
    Gapcoin. 2014. What is Gapcoin? http://gapcoin.org/index.php
    [18]
    M. Garey and D. Johnson. 1979. Computers and Intractability: A Guide to the Theory of NP Completeness. W.H. Freeman and Company, New York, NY, USA.
    [19]
    M. Jakobsson. 1999. Proofs of Work and Bread Pudding Protocols. In Secure Information Networks. The IFIP, vol 23 (CMS '99). Springer, Boston, MA, Leuven, Belgium, 258--272.
    [20]
    R. Karp. 1972. Reducibility among Combinatorial Problems. In IBM Research Symposia Series, Complexity of Computer Computations (CCS '72). Springer, Boston, MA, Yorkton Heights, NY, USA, 85--103.
    [21]
    S. King. 2013. Primecoin: Cryptocurrency with prime number proof of work. http://primecoin.io/bin/primecoin-paper.pdf
    [22]
    A. Loe. 2017. Conquering Generals NP-Hard Proof of Work for Blockchain Construction. https://yadi.sk/d/PG8kvFzP3SnTcs
    [23]
    S. Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. https://bitcoin.org/bitcoin.pdf
    [24]
    Institute of Electrical and Inc Electronics Engineers. 2008. IEEE Standard for Floating-Point Arithmetic.
    [25]
    N. Szabo. 2005. Bit Gold. http://nakamotoinstitute.org/bit-gold/
    [26]
    J. Tromp. 2015. Cuckoo Cycle: A Memory Bound Graph-Theoretic Proof-of-Work. In Lecture Notes in Computer Science, vol 8976 (Financial Cryptography and Data Security). Springer, Berlin, Heidelberg, San Juan, Puerto Rico, 49--62.
    [27]
    Litecoin Wikipage. 2015. Litecoin Scrypt Hashing. https://litecoin.info/index.php/Scrypt
    [28]
    F. Zhang, I. Eyal, R. Escriva, A. Juels, and R. van Renesse. 2017. REM: Resource-Efficient Mining for Blockchains. In 26th USENIX Security Symposium. Springer, Boston, MA, Santa Barbara, CA, USA, 1427--1444. https://eprint.iacr.org/2017/179.pdf

    Cited By

    View all
    • (2024)AI-enhanced blockchain technology: A review of advancements and opportunitiesJournal of Network and Computer Applications10.1016/j.jnca.2024.103858(103858)Online publication date: Mar-2024
    • (2023)Controlling the Difficulty of Combinatorial Optimization Problems for Fair Proof-of-Useful-Work-Based Blockchain Consensus ProtocolSymmetry10.3390/sym1501014015:1(140)Online publication date: 3-Jan-2023
    • (2023)A Taxonomic Hierarchy of Blockchain Consensus Algorithms: An Evolutionary Phylogeny ApproachSensors10.3390/s2305273923:5(2739)Online publication date: 2-Mar-2023
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CryBlock'18: Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems
    June 2018
    121 pages
    ISBN:9781450358385
    DOI:10.1145/3211933
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 15 June 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    MobiSys '18
    Sponsor:

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)27
    • Downloads (Last 6 weeks)1

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)AI-enhanced blockchain technology: A review of advancements and opportunitiesJournal of Network and Computer Applications10.1016/j.jnca.2024.103858(103858)Online publication date: Mar-2024
    • (2023)Controlling the Difficulty of Combinatorial Optimization Problems for Fair Proof-of-Useful-Work-Based Blockchain Consensus ProtocolSymmetry10.3390/sym1501014015:1(140)Online publication date: 3-Jan-2023
    • (2023)A Taxonomic Hierarchy of Blockchain Consensus Algorithms: An Evolutionary Phylogeny ApproachSensors10.3390/s2305273923:5(2739)Online publication date: 2-Mar-2023
    • (2023)Sybil in the Haystack: A Comprehensive Review of Blockchain Consensus Mechanisms in Search of Strong Sybil Attack ResistanceAlgorithms10.3390/a1601003416:1(34)Online publication date: 6-Jan-2023
    • (2023)A blockchain‐based framework to optimize shipping container flows in the hinterlandInternational Transactions in Operational Research10.1111/itor.1331931:6(3808-3841)Online publication date: 23-May-2023
    • (2023)Chrisimos: A useful Proof-of-Work for finding Minimal Dominating Set of a graph2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom60117.2023.00182(1332-1339)Online publication date: 1-Nov-2023
    • (2023)Exploring Arbitrary Real-Life Problems in Proof-of-Useful-Work: Myth Busting?2023 Fifth International Conference on Blockchain Computing and Applications (BCCA)10.1109/BCCA58897.2023.10338884(1-6)Online publication date: 24-Oct-2023
    • (2022)Proof-of-Useful-Work: BlockChain Mining by Solving Real-Life Optimization ProblemsSymmetry10.3390/sym1409183114:9(1831)Online publication date: 3-Sep-2022
    • (2022)Proof of Useful Work Based on Matrix Computation2022 24th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)10.1109/SYNASC57785.2022.00026(108-116)Online publication date: Sep-2022
    • (2022)Accelerating Blockchain-enabled Distributed Machine Learning by Proof of Useful Work2022 IEEE/ACM 30th International Symposium on Quality of Service (IWQoS)10.1109/IWQoS54832.2022.9812927(1-10)Online publication date: 10-Jun-2022
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media