gptkbp:instanceOf
|
Consensus algorithm
|
gptkbp:alternativeTo
|
gptkb:Proof-of-authority
gptkb:Proof-of-stake
|
gptkbp:award
|
Block reward
|
gptkbp:category
|
Cryptography
Distributed computing
Blockchain technology
|
gptkbp:criticizedFor
|
Environmental impact
Centralization risk
|
gptkbp:difficultyAdjustment
|
Yes
|
gptkbp:enables
|
Mining
|
gptkbp:example
|
gptkb:Ethash
gptkb:SHA-256
gptkb:Equihash
gptkb:Scrypt
|
gptkbp:firstUsedInYear
|
1997
|
gptkbp:introducedIn
|
gptkb:Hashcash
1993
|
gptkbp:inventedBy
|
gptkb:Cynthia_Dwork
gptkb:Moni_Naor
|
gptkbp:output
|
gptkb:Proof
Cryptographic puzzle solution
Valid block
|
gptkbp:popularizedBy
|
gptkb:Bitcoin_whitepaper
|
gptkbp:powerSource
|
High
|
gptkbp:purpose
|
Deter spam
Prevent double-spending
Secure blockchain
|
gptkbp:relatedTo
|
ASIC
Hash function
Sybil attack prevention
GPU mining
Mining pool
Nonce
|
gptkbp:requires
|
Electricity
Computational work
Specialized hardware
|
gptkbp:securityBasis
|
Majority hash power
|
gptkbp:usedBy
|
gptkb:Bitcoin
gptkb:Dogecoin
gptkb:Litecoin
gptkb:Ethereum_(pre-2022)
|
gptkbp:usedIn
|
gptkb:cryptocurrency
Anti-spam systems
Blockchain networks
Distributed ledgers
|
gptkbp:vulnerableTo
|
gptkb:51%_attack
|
gptkbp:bfsParent
|
gptkb:RandomX
gptkb:Equihash
|
gptkbp:bfsLayer
|
7
|