Why You Should LOVE Proof Of Stake Systems — Hybrids!

2017.05.01 Christian Seberino

0TCSJ3Q0BMHx5tF8E

Proof of work systems are widely used and have been thoroughly scrutinized. There is concern that funds will be at risk if proof of work systems are replaced with proof of stake systems. Fortunately, proof of stake systems can improve security rather than threatening it!

Proof Of Stake

0mf8PsX4EY9YMwj61

In proof of work systems, volunteers assist in the creation and validation of new blocks. Rewards are proportional to the amount of computing resources contributed to the process. There are built in disincentives for acting maliciously or foolishly. For example, contributing computing resources to losing chains will lead to financial losses.

Proof of stake systems attempt to keep the benefits of proof of work systems while eliminating the problems. There are multiple varieties and much ongoing research. Volunteers still assist in the creation and validation of new blocks. Rewards are proportional to the amount of funds (stakes) temporarily placed in escrow. There are still built in disincentives for acting maliciously or foolishly. For example, some systems confiscate escrowed funds if volunteers simultaneously work on multiple chains.

Benefits

0o3cDS0DXPCsQa75m

Proof of stake systems can strengthen proof of work systems rather than replacing them. They can simply add additional steps to the process of approving candidate blocks. This is analogous to adding a second lock on a door. Additional protections are welcome because proof of work systems are vulnerable to participants who control a majority of the computing resources. This can lead to 51% attacks:

"[A] mining pool — an association of people who own specialized hardware that produces Bitcoins by running specific mathematical operations — gained a 51 percent share of computing power used in currency production. That gave it the power to reverse transactions, to pay twice with the same Bitcoins, and to delay or even cancel other people’s transactions. The pool was GHash.io, run by a secretive U.K.-incorporated outfit called CEX.io"

Bloomberg, July 17, 2014

and

"I am Chandler Guo, a 51% attack on Ethereum Classic (ETC) is coming with my 98G hashrate. This is roughly 3 times [the] current ETC network hashrate. This is an action to against Poloniex’s decision to support ETC."

Cointelegraph, July 24, 2016

Such attacks might not be possible with proof of stake system additions.

Concerns

0O ngdM tp4uzOFvA

It is possible that vulnerabilities might be found in proof of stake systems. Although combining proof of work and proof of stake systems would likely be beneficial, there might still be problems. This is analogous to losing the key to a second door lock. Multiple door locks provide additional security, but, they also increase the chances of denying yourself access.

Conclusion

0DOkdlqd73UHBDWZj

Proof of stake systems do not necessarily have to eliminate proof of work systems. Blockchain systems can simultaneously juggle security and innovation.

Feedback

You can contact me by clicking any of these icons:

0cB1Yj6Xct58IQ8vE

0ofPrim7g7Z4s8MyC

0pInE9rfjbCmZujdP

Acknowledgments

I would like to thank IOHK (Input Output Hong Kong) for funding this effort.

License

0GohSlN8oSGd FcXX

This work is licensed under the Creative Commons Attribution ShareAlike 4.0 International License.


All Blog Posts