What is Proof-of-Stake? - Crush Crypto

What is Proof-of-Stake?

This is the second article on blockchain consensus mechanisms in our educational series. To read the first article about proof of work, click here.

History

The proof-of-stake consensus mechanism was first suggested on the Bitcointalk forum in 2011, but was not formally introduced until Sunny King and Scott Nadal wrote a paper on it in August 2012.

Instead of relying on the energy dependent computational work of miners to securely add blocks to the chain, Sunny and Scott proposed the method of staking - where an algorithm would choose block validators based on the number of coins a person has.

They proposed this method to try and tackle Bitcoin’s increasing energy costs and mining difficulty that was going to continue indefinitely as long as it is profitable for miners to purchase more hash power.

Sunny King later created Peercoin based off this paper, the first cryptocurrency to implement a proof-of-stake consensus mechanism. However, it used a hybrid proof of work and proof-of-stake system considering that proof-of-stake was still an unproven mechanism with security concerns.


Overview

Just like proof of work, proof-of-stake is a mechanism designed for deciding who gets to validate the current block and achieving consensus between the network’s nodes on what data is valid. However, proof of work and proof-of-stake use completely different methods to achieve the same end goal.

Proof-of-stake algorithms achieve consensus by requiring users to put a certain amount of their coins “at stake” to have a chance of being selected to validate a block of transactions and receiving that block reward. Malicious actors risk losing their stake.

The more coins at stake, the higher chance the user will get to validate the next block and reap the block reward (newly minted coins and transaction fees generated in the block). Proof-of-stake validators are called “forgers” instead of “miners”.


How does it work?

Putting coins at stake can be thought of as locking the coins in a virtual safe and using it as collateral to have the chance of validating a block. Holding coins in a wallet is not enough to be considered for validation, and once the coins are staked there is a waiting period to withdraw them.

If there is a malicious forger that tries to include faulty transactions in a block, they will lose all the coins they have at stake. This mechanism is called slashing, and it ensures that validators are incentivized to act in an honest manner.

A forger of a new block is chosen by two-part process. The first part considers how many coins the user is staking, while the second part varies between networks.

One commonly used method for the second part is randomized block selection, where forgers are selected by looking for users with a combination of the lowest hash value and highest stake. Another method is coin age selection, which chooses validators based on highest stake and how long the coins have been staked for.


51% attack

As discussed in our previous proof-of-work article, the main attack vector for the PoW consensus mechanism is a 51% attack. As mining pools continue to grow and a small set of entities/mining pools control more and more of the miner supply, the easier a theoretical proof of work 51% attack becomes.

In a proof-of-stake system, a 51% attack is also a possible attack vector. However, this type of 51% attack requires a malicious actor to obtain 51% of more of the supply of that coin – theoretically a much more difficult (and expensive) feat than pooling 51% of a network’s mining power.

Even if an attacker has enough funds to buy 51% or more of a coin’s market cap, the purchasable supply at any time is well under 51% due to limited exchange liquidity.

It would take a large amount of money and time to gather the resources to launch a 51% attack on a proof-of-stake system of a major coin. At the same time, the accumulation for the attacker would cause the coin’s value to increase substantially, causing the attack to become more expensive.

There is also a reduced incentive to launch a 51% attack on a proof-of-stake system, as the person suffering the most from it would be the attacker that is now the majority stakeholder in the network.


Benefits

  • Energy savings: Proof-of-stake uses an extremely low amount of computing power to secure the network when compared to proof of work. 
  • Reduced 51% attack probability: In general, a proof-of-stake system is harder to launch a 51% attack on than a proof of work system with the same market cap.
  • Low barrier to entry: Any coin holder above a certain amount can enter the validator pool simply by staking their coins. There is no requirement to purchase mining equipment, set up a machine, and ensure it stays running in good condition.
  • Built-in incentives: An attacker in a proof-of-stake system must have coins at stake, and their attack would directly devalue the coins they own. Compare this to proof of work, where mining equipment can be used to attack a network and will still hold the same monetary value after the attack and can be used to mine other coins.

Weaknesses

  • Validators with large stakes: If a small number of people own a significant portion of a coin’s supply, they will have a higher chance of validating blocks and reaping the rewards, in turn increasing their stake even more. This could lead to supply centralization over time.
  • Voting for multiple forks: Proof-of-stake by itself is not an efficient way to achieve consensus because people staking can vote for multiple forks of a blockchain effortlessly. In proof of work this is far less likely, as validating blocks on multiple chains has a real-world cost associated with energy. As a result, many proof-of-stake systems have a mixture of PoS and PoW to ensure there is a final decision on the valid chain.
  • Other security concerns: There are still some major security concerns with proof-of-stake, such as the nothing at stake problem and long-range attacks. As proof-of-stake is still a relatively new concept, researchers are finding ways to mitigate or eliminate these threats and improve the proof-of-stake mechanism and breakthroughs could happen in the near future.

Video Summary


* The information contained in this article is for education purpose only and not financial advice. Do your own research before making any investment decisions.

This article is contributed by Victor Lai with the help of our Senior Analyst Kieran O'Day.

  •  
    37
    Shares
  • 37
  •  
  •  
  •  
  •  
  •  
  •  
  •  

Click Here to Leave a Comment Below