Proof-of-Work Cryptocurrencies: Does Mining Technology Undermine Decentralization?

نویسندگان

چکیده

Does the proof-of-work protocol serve its intended purpose of supporting decentralized cryptocurrency mining? To address this question, we develop a game-theoretical model where miners first invest in hardware to improve efficiency their operations, and then compete for mining rewards rent-seeking game. We argue that because capacity constraints faced by miners, centralization is lower than indicated both public discourse recent academic work. show advancements do not necessarily lead larger increasing advantage, investment new contributes decentralization but rather allow smaller expand enter competition. Our calibrated illustrates has small impact on cost attacking network, while reward significant impact. This highlights vulnerability emerging cryptocurrencies, as well established cryptocurrencies transitioning fee-based scheme.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptocurrencies Without Proof of Work

We study cryptocurrency protocols that do not make use of Proof of Work. Such protocols commonly rely on Proof of Stake, i.e. on mechanisms that extend voting power to the stakeholders of the system. We offer analysis of existing protocols that have a substantial amount of popularity. We then present our novel pure Proof of Stake protocols, and argue that the they help in mitigating problems th...

متن کامل

Cowboys or Commanders: Does Information Technology Lead to Decentralization?

People have long speculated about the relation between information technology (IT) and centralization in organizations. For example, previous research has reported various cases in which IT appears to have led to more centralization, more decentralization, or no change in centralization. In this paper we describe a simple new way to model the relationship between IT and the structure of organiz...

متن کامل

Does Opacity Undermine Privileged Access ?

Carruthers argues that knowledge of our own propositional attitudes is achieved by the same mechanism used to attain knowledge of other people’s minds. This seems incompatible with “privileged access”—the idea that we have more reliable beliefs about our own mental states, regardless of the mechanism. At one point Carruthers seems to suggest he may be able to maintain privileged access, because...

متن کامل

Fundamental Values of Cryptocurrencies and Blockchain Technology

We propose a theoretical model to measure the fundamental values of cryptocurrency and blockchain technology. Due to its secure nature, blockchain allows the transactions to be state-contingent based on highly credible state information. In an economy with adverse selection, traders have an incentive to buy assets with unknown quality by using cryptocurrency to exploit the higher security of bl...

متن کامل

PSYCHE: http://psyche.cs.monash.edu.au/ ALTER: DOES SYNESTHESIA UNDERMINE REPRESENTATIONALISM? 1 Does Synesthesia Undermine Representationalism?

On Gregg Rosenberg’s (2004) view, synesthesia illustrates how phenomenal properties can vary independently of representational properties. I explain how the representationalist can answer his arguments. The belief that synesthesia poses a serious problem for representationalism derives, I argue, from misconceptions about representationalism. Rosenberg’s discussion of synesthesia and representat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Social Science Research Network

سال: 2021

ISSN: ['1556-5068']

DOI: https://doi.org/10.2139/ssrn.3869144