skip to main content

Useful Bitcoin Mining with a Matrix-based Puzzle

Project

Project Details

Program
Computer Science
Field of Study
Supercomputing, Blockchain, Cryptocurrency
Division
Computer, Electrical and Mathematical Sciences and Engineering
Center Affiliation
Resilient Computing and Cybersecurity Center

Project Description

Cryptocurrency and blockchain technologies are increasingly gaining adoption since the introduction of Bitcoin, being distributed, authority-free, and secure. Proof of Work (PoW) is at the heart of blockchain’s security, asset generation, and maintenance. In most cryptocurrencies, and mainly Bitcoin, the “work” a miner must do is to solve a cryptographic puzzle: to find a random nonce that once (cryptographically) SHA-256 hashed with a perspective block header, returns a 32 Bytes number having a leading pre-defined number of zeros (called difficulty). This puzzle represents the PoW, and lives forever in the blockchain (together with the block), allowing for future verifications. The main property of this puzzle is being very hard to solve, but easy to verify. Unfortunately, solving the puzzle is a very controversial being computation-hungry process that manifests in very high energy consumption (e.g., similar to the total electricity consumption of Denmark in 2020). Although other environment-friendly solutions are being suggested, e.g., Proof of Stake, the Bitcoin community has no plans to change the mining method using cryptographic puzzle. Shutting done the Bitcoin network is not an option either because it can disrupt the global economy with a market cap of around half trillion dollars as per today. Proof of eXercise (PoX) is an alternative puzzle that is getting more acceptance in academia. PoX suggests a matrix-based puzzle, e.g., matrix product and determinant calculation, that has close security properties to the cryptographic puzzle, but has at the same time useful benefits for the community, e.g., DNA and RNA sequencing, protein structure analysis, im-age processing, data mining [16], computational geometry, surface matching, space model analysis, etc. While computing the matrix product is very hard (which is required by design), its verification is also hard, making it infeasible. PoX proposes a probabilistic verification protocol that challenges the miner to only give the results of selected columns x rows multiplication for verification, thus making verification easy. Since selection is random, the miner cannot guess the columns x rows apriori, and thus must have computed the matrix correctly.

About the Researcher

Paulo Esteves-Verissimo
Professor, Computer Science
Computer, Electrical and Mathematical Science and Engineering Division

Affiliations

Education Profile

  • Ph.D., Electrical and Computer Engineering, University of Lisbon (PT), 1990
  • MSc, Electrical and Computer Engineering, University of Lisbon IST (PT), 1984
  • Lic., Electrical Engineering, University of Lisbon IST (PT), 1978

Research Interests

Professor Esteves-VerA­ssimo is currently interested in architectures, middleware and algorithms for resilient modular and distributed computing. It is increasingly believed that Resilient Computing will become the main paradigm for achieving secure and dependable operation of computer systems and networks in a near future, improving classic Cybersecurity techniques. This is due to important intrinsic characteristics of this B.o.K., such as: common approach to accidental and malicious faults/attacks; incremental and adaptive protection against polymorphic threat surfaces; elasticity, plasticity and sustainability. To this end, he investigates such paradigms and techniques reconciling security and dependability, as well as novel ways to apply them in order to achieve system resilience, in areas like: autonomous vehicles from earth to space; distributed control systems; digital health and genomics; SDN-based infrastructures; or blockchain and cryptocurrencies. His research is published in over 200 peer-refereed international publications and 5 international books. He was invited as well to present it in more than 70 keynote speeches or distinguished lectures at reputed venues. Esteves-VerA­ssimo also has a solid systems and engineering track record, having contributed to the design and engineering of several advanced industrial prototypes of distributed, fault-tolerant, secure or real-time systems, emerging from R&D projects he took part in.

Selected Publications

  • Jiangshan Yu, David Kozhaya, JA©rA©mie Decouchant, Paulo Esteves-VerA­ssimo. RepuCoin: Your Reputation is Your Power (2019). In IEEE Trans. on Computers, 68(8), 1225-1237.
  • Kreutz, Diego; Ramos, F. M. V.; Verissimo, Paulo; Rothenberg, C. E.; Azodolmolky, S.; Uhlig, S. ""Software-Defined Networking: A Comprehensive Survey"", in Proceedings of the IEEE (2015), 103(1), 14-76.
  • Giuliana Veronese, Miguel Correia, Alysson Bessani, Lau Lung, Paulo Verissimo, ""Efficient Byzantine Fault-Tolerance"", IEEE Tacs. on Computers, vol. 62, no. 1, Jan. 2013.
  • Paulo Sousa, Alysson Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo VerA­ssimo. Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery. IEEE Tacs. on Parallel and Distributed Systems. Apr. 2010.
  • VerA­ssimo, P., Casimiro, A.: The timely computing base model and architecture. IEEE Tacs. on Computers, Special Issue on Asynchronous Real-Time Distr. Systems (2002).
  • D. Powell, D. Seaton, G. Bonn, P. VerA­ssimo, and F. Waeselynk. The Delta-4 approach to dependability in open distributed computing systems. In N. Suri, C. Walter, and M. Hugue, editors, Adv. in Ultra-Dependable Distr. Sys. IEEE Computer Society, 1995.

Desired Project Deliverables

The goal of the project is to experiment the feasibility of this matrix-based puzzle empirically on the Sheheen super computer at KAUST. The intern will work with RC3 experts and Shaheen engineers to realize the experiments. The objectives of the project are to present to the community evidences that the proposed PoX puzzle is a reasonable alternative to the cryptographic puzzle from the security and monetization perspectives (e.g., the miner has more incentives since it gets paid by the problem proponent as well and by getting the coins while mining). The results of the project will be published or commercialized.

Recommended Student Background

Cryptocurrency, Bitcoin
Supercomputing
Math
Blockchain, Distributed Systems