Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Equihash

From Wikipedia, the free encyclopedia
Cyrptocurrency algorithm

Equihash is a memory-hardProof-of-work algorithm introduced by theUniversity of Luxembourg's Interdisciplinary Centre for Security, Reliability and Trust (SnT) at the 2016 Network and Distributed System Security Symposium. The algorithm is based on a generalization of theBirthday problem which finds colliding hash values. It has severe time-space trade-offs but concedes vulnerability to unforeseen parallel optimizations.[1] It was designed such that parallel implementations are bottle-necked by memory bandwidth in an attempt to worsen the cost-performance trade-offs of designing customASIC implementations. ASIC resistance in Equihash is based on the assumption that commercially-sold hardware already has quite high memory bandwidth, so improvements made by custom hardware may not be worth the development cost.[citation needed]

General

[edit]

Equihash was proposed byAlex Biryukov andDmitry Khovratovich as part of the University of Luxembourg research group CryptoLUX. It was introduced at the Network and Distributed System Security Symposium 2016 inSan Diego. Notableblockchain-based projects such asZCash, BitcoinZ, Horizen, Aion, Hush, andPirate Chain have integrated Equihash for reasons such as security, privacy, andASIC miner resistance.[citation needed]

The manufacturerBitmain has succeeded in optimizing the processing of Zcash's Equihash-200,9 with an ASIC.[2]

Specification

[edit]

Equihash has three parameters –n{\displaystyle n},k{\displaystyle k}, andd{\displaystyle d} – which determine the algorithm's time and memory requirements. The time complexity is proportional to2nk+1+d{\displaystyle 2^{{\frac {n}{k+1}}+d}}while the memory complexity is proportional to2k+nk+1{\displaystyle 2^{k+{\frac {n}{k+1}}}}. The algorithm is often implemented withd=0{\displaystyle d=0} (using an alternative method of controlling the effective difficulty).[1]

The problem in Equihash is to find distinct,n{\displaystyle n}-bit valuesi1,i2,...,i2k{\displaystyle i_{1},i_{2},...,i_{2^{k}}} to satisfyH(i1)H(i2)...H(i2k)=0{\displaystyle H(i_{1})\oplus H(i_{2})\,\oplus \,...\,\oplus \,H(i_{2^{k}})=0} such thatH(i1i2...i2k){\displaystyle H(i_{1}\parallel i_{2}\parallel \,...\,\parallel i_{2^{k}})} hasd{\displaystyle d} leading zeros, whereH{\displaystyle H} is a chosenhash function.[1] In addition, there are "algorithm binding conditions" which are intended to reduce the risk of other algorithms developed to solve the underlying birthday problem being applicable. A memory-less verification requires2k{\displaystyle 2^{k}}hashes and XORs.[1]

Memory-hardness and time-space tradeoffs

[edit]

It is proposed that the puzzle in Equihash be solved by a variation of Wagner's algorithm for the generalized birthday problem. (Note that the underlying problem is not exactly the Generalized Birthday Problem as defined by Wagner, since it uses a single list rather than multiple lists.) The proposed algorithm makesk{\displaystyle k} iterations over a large list.[1][3] For every factor of1q{\displaystyle {\frac {1}{q}}} fewer entries per list, computational complexity of the algorithm scales proportional toqk2{\displaystyle q^{\frac {k}{2}}} for memory-efficient implementations. Alcock and Ren[4]refute Equihash’s security claims, concluding that no tradeoff-resistance bound is in fact known for Equihash.

Usage

[edit]
This sectiondoes notcite anysources. Please helpimprove this section byadding citations to reliable sources. Unsourced material may be challenged andremoved.(February 2021) (Learn how and when to remove this message)

The cryptocurrencyZcash implements Equihash withn=200{\displaystyle n=200} andk=9{\displaystyle k=9}.

The cryptocurrencyBitcoinGold implements Equihash withn=144{\displaystyle n=144} andk=5{\displaystyle k=5}.

See also

[edit]

References

[edit]
  1. ^abcdeBiryukov, Alex; Khovratovich, Dmitry (2017)."Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem: Open Review".Ledger.2.doi:10.5195/ledger.2017.48.Archived from the original on 13 October 2018. Retrieved7 October 2018.
  2. ^Dölle, Mirko (June 26, 2018)."End of the graphics card era: 8000 ASIC Miners for Zcash, Bitcoin Gold & Co".Heise (in German).Archived from the original on 6 September 2018. Retrieved6 Oct 2018.
  3. ^Wagner, David (2002), "A Generalized Birthday Problem",Advances in Cryptology — CRYPTO 2002, Lecture Notes in Computer Science, vol. 2442, Springer Berlin Heidelberg, pp. 288–304,CiteSeerX 10.1.1.5.5851,doi:10.1007/3-540-45708-9_19,ISBN 9783540440505
  4. ^Alcock, Leo; Ren, Ling (November 3, 2017)."A Note on the Security of Equihash".CCSW '17. Proceedings of the 2017 Cloud Computing Security Workshop. 2017 ACM SIGSAC Conference on Computer and Communications Security. Dallas, TX, USA: ACM.doi:10.1145/3140649.3140652.Archived from the original on July 22, 2020. RetrievedJuly 21, 2020.

External links

[edit]
Common functions
SHA-3 finalists
Other functions
Password hashing/
key stretching functions
General purpose
key derivation functions
MAC functions
Authenticated
encryption
modes
Attacks
Design
Standardization
Utilization
General
Mathematics
Technology
Consensus mechanisms
Proof of work currencies
SHA-256-based
Ethash-based
Scrypt-based
Equihash-based
RandomX-based
X11-based
Other
Proof of stake currencies
ERC-20 tokens
Stablecoins
Other currencies
Inactive currencies
Crypto service companies
Related topics
Portals:
Retrieved from "https://en.wikipedia.org/w/index.php?title=Equihash&oldid=1257589833"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp