• Y.O.R
  • Posts
  • Proof of Useful Work?? A Cool Concept called Gophy

Proof of Useful Work?? A Cool Concept called Gophy

Transforming Crypto Mining into Scientific Discovery

No More Meaningless Puzzles

Alright family, let's dive into this blockchain project that's trying to merge the worlds of High Energy Physics (HEP) and crypto. It’s called Gophy!! The researchers behind this are aiming to replace those energy-guzzling hash-based Proof-of-Work (PoW) consensus mechanisms with something called Proof-of-Useful-Work (PoUW). Basically, what’s the point of miners performing computationally intensive but ultimately useless work like solving arbitrary cryptographic hash puzzles? Instead of wasting computational power on meaningless hash puzzles, miners would run Monte Carlo simulations related to real-world HEP experiments.


Monte Carlo simulations are used in HEP for tasks such as:

  1. Detector design and optimization: Running simulations to test different detector configurations and materials to optimize their performance in detecting and measuring particle interactions.

  2. Background estimation: Simulating known physics processes to estimate the background signals that need to be subtracted from the experimental data to isolate signals of interest.

  3. Event generation: Simulating the particle collisions and decays based on theoretical models (e.g., the Standard Model) to compare with real experimental data.

  4. Data analysis: Using simulated events to develop and test analysis techniques for extracting physics measurements from the experimental data.

Their idea is to create a permissioned blockchain network where a special node, called the Root Authority (RA), defines simulation tasks as block problems. Miners then compete to solve these problems, and the winner gets rewarded with tradable tokens. It's like a win-win situation – the blockchain gets secured, and these HEP experiments get free computing power. Genius, right? At least I thought so

Clever Mechanisms

The researchers laid out a detailed architecture for this PoUW blockchain, complete with a token-based cryptocurrency as an incentive for participation. Here is a look at how they tackle challenges below:

Solution Verification:
When miners submit their solutions, the RA can compare these sub-problem results against its known correct solutions. It’s the first filter to weed out wrong solutions. If a miner's sub-problem solution doesn't match the RA's, it gets flagged as potentially incorrect.

After sub-problem matching, there's a chance some incorrect solutions could still slip through. So the next step is for the RA to look at the full simulation solutions submitted by miners who passed the sub-problem filter. The underlying assumption is that if there are more honest miners than malicious ones, the most common solution is likely the correct one.


Identity Control:

As mentioned, real-world identity verification of miners is a key part of preventing Sybil attacks where a malicious actor tries to control multiple identities on the network. Miners have to prove their real identity to the Root Authority before being allowed to join and participate. This allows penalizing bad actors if needed.

Data Transmission Bottlenecks:

Subscribe to Keep Reading

Don't worry it's completely FREE!

Already a subscriber?Sign in.Not now

Reply

or to participate.