One of the key elements for the success of blockchain, whether it is a public chain or a private chain, is that the executors of the 51% attack (especially miners) must be credible. In theory, the more executors there are, the more credible the 51% attack is. However, a large number of Bitcoin developers (including Gregory Maxwell, Peter Todd, Luke-Jr, etc.) have shown that the Bitcoin mining industry is centralized and the computing power is in the hands of a very few people. With the invention of professional integrated circuits and the advent of economies of scale, large mining companies have chosen remote areas of China as their locations. This is because electricity is cheap there, which increases mining profits. Obviously, block mining rewards and transaction fees are more profitable than malicious 51% attacks. But as long as the risk of 51% attacks exists, it is not surprising that someone really uses it to do bad things. Recently, Shanghai Jiao Tong University and Virginia Commonwealth University in the United States jointly published a paper (full text download) aimed at solving malicious 51% attacks. The paper begins: Bitcoin cleverly uses the computing power of miners to ensure the security of the blockchain. Based on this, this paper proposes to use Bitcoin transactions in the hands of users to further improve network security. In other words, this scheme adds an extra layer of protection to the proof of work (PoW), which can also be called proof of stake (PoS). The paper analyzes the specific implementation methods of PoS and some application concepts, including Ethereum's Casper. The researchers said that the random number generator used by Casper is an extractor based on the previous state of the blockchain, in which the function is derived from the missing block proposition, so its data is controllable. In addition, researchers said that the current PoS mechanism will lock the currency, which can easily bring potential risks. The paper suggests not locking in currencies, but letting users choose the best blockchain:
The researchers say that combining the two mechanisms could effectively prevent malicious users in PoW and malicious miners in PoS. However, it is unclear whether this solution is actually feasible. |
The zygomatic bone is a bone located below our ey...
Eyebrows show your relationship with your brother...
The next Bitcoin halving will take place on May 1...
The mouth is one of the important parts of the fi...
The price of Bitcoin has experienced great fluctu...
The mouth is one of the five senses. In physiogno...
We can see many petty women in relationships and ...
It seems that some of the more common palm lines h...
Can a weak face achieve great things? In life, ea...
The Bitcoin exchange-traded fund (ETF) of brother...
The lines on our hands can appear in many ways, s...
S-shaped eyebrows, that is, eyebrows in the shape...
IQ is very important to everyone and can even det...
What do the positions of moles on men mean? What ...
In physiognomy, we can judge a person's fortu...