HashCore: Proof-of-Work Functions for General Purpose Processors

被引:6
|
作者
Georghiades, Yanni [1 ]
Flolid, Steven [1 ]
Vishwanath, Sriram [1 ]
机构
[1] Univ Texas Austin, Dept ECE, Austin, TX 78712 USA
来源
2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019) | 2019年
关键词
Blockchain; Proof-of-Work; Mining; Security; Cryptography; Collision-Resistant Hash Function;
D O I
10.1109/ICDCS.2019.00193
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Over the past five years, the rewards associated with mining Proof-of-Work blockchains have increased substantially. As a result, miners are heavily incentivized to design and utilize Application Specific Integrated Circuits (ASICs) that can compute hashes far more efficiently than existing general purpose hardware. Currently, it is difficult for most users to purchase and operate ASICs due to pricing and availability constraints, resulting in a relatively small number of miners with respect to total user base for most popular cryptocurrencies. In this work, we aim to invert the problem of ASIC development by constructing a Proof-of-Work function for which an existing general purpose processor (GPP, such as an x86 IC) is already an optimized ASIC. In doing so, we will ensure that any would-be miner either already owns an ASIC for the Proof-of-Work system they wish to participate in or can attain one at a competitive price with relative ease. In order to achieve this, we present HashCore, a Proof-of-Work function composed of "widgets" generated pseudo-randomly at runtime that each execute a sequence of general purpose processor instructions designed to stress the computational resources of such a GPP. The widgets will be modeled after workloads that GPPs have been optimized for, for example, the SPEC CPU 2017 benchmark suite for x86 ICs, in a technique we refer to as inverted benchmarking. We provide a proof that HashCore is collision-resistant regardless of how the widgets are implemented. We observe that GPP designers/developers essentially create an ASIC for benchmarks such as SPEC CPU 2017. By modeling HashCore after such benchmarks, we create a Proof-of-Work function that can be run most efficiently on a GPP, resulting in a more accessible, competitive, and balanced mining market.
引用
收藏
页码:1951 / 1959
页数:9
相关论文
共 50 条
  • [1] Toward Trusted IoT by General Proof-of-Work
    Hsueh, Chih-Wen
    Chin, Chi-Ting
    SENSORS, 2023, 23 (01)
  • [2] Evaluating Memory-Hard Proof-of-Work Algorithms on Three Processors
    Feng, Zonghao
    Luo, Qiong
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2020, 13 (06): : 898 - 911
  • [3] Fair overload handling using proof-of-work functions
    Golze, S
    Mühl, G
    INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET , PROCEEDINGS, 2006, : 14 - +
  • [4] A GENERAL DIFFICULTY CONTROL ALGORITHM FOR PROOF-OF-WORK BASED BLOCKCHAINS
    Zhang, Shulai
    Ma, Xiaoli
    2020 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2020, : 3077 - 3081
  • [5] Maximizing proof-of-work decentralization
    Culha, Davut
    INGENIERIA SOLIDARIA, 2024, 20 (01): : 22 - 22
  • [6] Better Incentives for Proof-of-Work
    Sliwinski, Jakub
    Wattenhofer, Roger
    STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS (SSS 2022), 2022, 13751 : 314 - 328
  • [7] Preventing proof-of-work mining attacks
    Azimy, Hamid
    Ghorbani, Ali A.
    Bagheri, Ebrahim
    Information Sciences, 2022, 608 : 1503 - 1523
  • [8] Parallel Proof-of-Work with Concrete Bounds
    Keller, Patrik
    Boehme, Rainer
    PROCEEDINGS OF THE 2022 4TH ACM CONFERENCE ON ADVANCES IN FINANCIAL TECHNOLOGIES, AFT 2022, 2022, : 1 - 15
  • [9] Preventing proof-of-work mining attacks
    Azimy, Hamid
    Ghorbani, Ali A.
    Bagheri, Ebrahim
    INFORMATION SCIENCES, 2022, 608 : 1503 - 1523
  • [10] Is the Cost of Proof-of-Work Consensus Quasilinear?
    Asgaonkar, Aditya
    Palande, Pranav
    Joshi, Ramprasad S.
    PROCEEDINGS OF THE ACM INDIA JOINT INTERNATIONAL CONFERENCE ON DATA SCIENCE AND MANAGEMENT OF DATA (CODS-COMAD'18), 2018, : 314 - 317