Inner For-Loop for Speeding Up Blockchain Mining

Abstract In this paper, the authors propose to increase the efficiency of blockchain mining by using a population-based approach. Blockchain relies on solving difficult mathematical problems as proof-of-work within a network before blocks are added to the chain. Brute force approach, advocated by some as the fastest algorithm for solving partial hash collisions and implemented in Bitcoin blockchain, implies exhaustive, sequential search. It involves incrementing the nonce (number) of the header by one, then taking a double SHA-256 hash at each instance and comparing it with a target value to ascertain if lower than that target. It excessively consumes both time and power. In this paper, the authors, therefore, suggest using an inner for-loop for the population-based approach. Comparison shows that it’s a slightly faster approach than brute force, with an average speed advantage of about 1.67% or 3,420 iterations per second and 73% of the time performing better. Also, we observed that the more the total particles deployed, the better the performance until a pivotal point. Furthermore, a recommendation on taming the excessive use of power by networks, like Bitcoin’s, by using penalty by consensus is suggested.

[1]  W. Bolt Bitcoin and Cryptocurrency Technologies : A Comprehensive Introduction , 2017 .

[2]  Z. Beheshti A review of population-based meta-heuristic algorithm , 2013, SOCO 2013.

[3]  Quynh H. Dang,et al.  Secure Hash Standard | NIST , 2015 .

[4]  Luca Weisz Schaums Outline Of Theory And Problems Of Business Statistics , 2016 .

[5]  Maurice Clerc,et al.  From Theory to Practice in Particle Swarm Optimization , 2011 .

[6]  Alex Biryukov,et al.  Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem , 2016, NDSS.

[7]  Dan Boneh,et al.  On genetic algorithms , 1995, COLT '95.

[8]  Arvind Narayanan,et al.  Bitcoin and Cryptocurrency Technologies - A Comprehensive Introduction , 2016 .

[9]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[10]  G. Geetha,et al.  Cryptographic Hash Functions: A Review , 2012 .

[11]  Alex Biryukov,et al.  Asymmetric proof-of-work based on the Generalized Birthday problem , 2017, IACR Cryptol. ePrint Arch..

[12]  Russell C. Eberhart,et al.  A new optimizer using particle swarm theory , 1995, MHS'95. Proceedings of the Sixth International Symposium on Micro Machine and Human Science.

[13]  Per Kristian Lehre,et al.  Finite First Hitting Time versus Stochastic Convergence in Particle Swarm Optimisation , 2011, ArXiv.

[14]  Danilo Gligoroski,et al.  SoK of Used Cryptography in Blockchain , 2019, IEEE Access.

[15]  Piotr Szwed,et al.  Formal Analysis of Use Case Diagrams , 2010, Comput. Sci..

[16]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[17]  Tosin P. Adewumi Inner loop program construct: A faster way for program execution , 2018, Open Comput. Sci..

[18]  C H Swaroop,et al.  A Byte of Python , 2013 .

[19]  Adam Back,et al.  Hashcash - A Denial of Service Counter-Measure , 2002 .

[20]  Pavel S. Fedotov,et al.  ASIC-resistant hash functions , 2018, 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus).

[21]  Morris J. Dworkin,et al.  SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions , 2015 .

[22]  Ye Er-lan,et al.  The Introduction of Particle Swarm Optimization , 2010 .

[23]  H Lee Willis,et al.  Power distribution planning reference book , 2000 .

[24]  Goldberg,et al.  Genetic algorithms , 1993, Robust Control Systems with Genetic Algorithms.