How Blockchains Work

Illustrated from transaction to reward

2 min read
All illustrations: Greg Mably
All illustrations: Greg Mably

Every blockchain needs a way to determine who will add the next block of data. Two strategies prevail: proof of work and proof of stake. Both randomly assign the right to add new blocks. But proof of work gives preference to those with more computing power. And proof of stake—of which there are many versions, some wildly complex—gives preference to those with more coins.

  • img All illustrations: Greg Mably

    Miners & Signers

    Alice tells the Bitcoin network she wants to pay Bob [left]. She uses a cryptographic key to digitally sign off on the transaction, providing proof that she owns these coins.

    Network operators, called miners or block signers, scoop up a bunch of transactions to validate them. They check that the digital signatures are correct and that there are enough coins for the requested transactions. Then they put all the new transactions into a new data block [right] to be added to the blockchain.

  • img

    Proof of Work (Bitcoin)

    The Bitcoin miner creates a hash from a particular set of data. If the hash does not begin with a particular number of zeros, the hash function is rerun using a new random number (the nonce). Including previous blocks in every new hash compounds the difficulty of tampering with older transactions.

  • img

    Proof of Stake (Peercoin)

    The Peercoin block signer creates a hash from a set of data that includes coin age—a number indicating an amount of coins owned by the signer and how long they’ve owned them. If the hash does not begin with a particular number of zeros, the function is rerun using a new time stamp.

  • img

    Paying for Security

    The first miner or block signer to get the right hash adds their version of the block of transactions to the blockchain. They also get paid in newly generated coins.

    img

    As more blocks are added, it becomes harder and harder to hack old transactions.

See “Blockchains: How They Work and Why They’ll Change the World.”

The Conversation (0)

Video Friday: DARPA Subterranean Challenge Final

1 min read
DARPA

This week we have a special DARPA SubT edition of Video Friday, both because the SubT Final is happening this week and is amazing, and also because (if I'm being honest) the SubT Final is happening this week and is amazing and I've spent all week covering it mostly in a cave with zero access to Internet. Win-win, right? So today, videos to watch are DARPA's recaps of the preliminary competition days, plus (depending on when you're tuning in) a livestream of the prize round highlights, the awards ceremony, and the SubT Summit with roundtable discussions featuring both the Virtual and Systems track teams.

Keep Reading ↓ Show less

Making 3D-Printed Objects Feel

3D-printing technique lets objects sense forces applied onto them for new interactive applications

2 min read

Researchers from MIT have developed a method to integrate sensing capabilities into 3D printable structures comprised of repetitive cells, which enables designers to rapidly prototype interactive input devices.

MIT

Some varieties of 3D-printed objects can now “feel," using a new technique that builds sensors directly into their materials. This research could lead to novel interactive devices such as intelligent furniture, a new study finds.

The new technique 3D-prints objects made from metamaterials—substances made of grids of repeating cells. When force is applied to a flexible metamaterial, some of their cells may stretch or compress. Electrodes incorporated within these structures can detect the magnitude and direction of these changes in shape, as well as rotation and acceleration.

Keep Reading ↓ Show less

How to Write Exceptionally Clear Requirements: 21 Tips

Avoid bad requirements with these 21 tips

1 min read

Systems Engineers face a major dilemma: More than 50% of project defects are caused by poorly written requirements. It's important to identify problematic language early on, before it develops into late-stage rework, cost-overruns, and recalls. Learn how to identify risks, errors and ambiguities in requirements before they cripple your project.

Trending Stories

The most-read stories on IEEE Spectrum right now