Proof of work (also written asproof-of-work, and abbreviatedPoW) is a form ofcryptographicproof in which one party (theprover) proves to others (theverifiers) that a certain amount of a specific computational effort has been expended.[1] Verifiers can subsequently confirm this expenditure with minimal effort on their part. The concept was first proposed byMoni Naor andCynthia Dwork in 1993 as a way to deterdenial-of-service attacks and other service abuses such asspam on a network by requiring some work from a service requester, usually meaning processing time by a computer. Extending the work of Cynthia Dwork and Moni Naor,Adam Back formally described a proof of work system calledHashcash as a protection against email spam in 1997. The term "proof of work" was first coined and formalized in a 1999 paper byMarkus Jakobsson andAri Juels.[2][3] The concept was adapted to digital tokens byHal Finney in 2004 through the idea of "reusable proof of work" using the 160-bit secure hash algorithm 1 (SHA-1).[4]
Proof of work was later popularized byBitcoin as a foundation for consensus in a permissionless decentralized network, in which miners compete to append blocks and mine new currency, each miner experiencing a success probability proportional to the computational effort expended. PoW and PoS (proof of stake) remain the two best knownSybil deterrence mechanisms. In the context ofcryptocurrencies they are the most common mechanisms.[5]
A key feature of proof-of-work schemes is their asymmetry: thework – the computation – must be moderately hard (yet feasible) on the prover or requester side but easy to check for the verifier or service provider. This idea is also known as a CPU cost function,client puzzle, computational puzzle, or CPU pricing function. Another common feature is built-inincentive-structures that reward allocating computational capacity to the network withvalue in the form of cryptocurrency.[6][7]
The purpose of proof-of-work algorithms is not proving that certainwork was carried out or that a computational puzzle was "solved", but deterring manipulation of data by establishing large energy and hardware-control requirements to be able to do so.[6] Proof-of-work systems have been criticized by environmentalists for their energy consumption.[8]
The concept of Proof of Work (PoW) has its roots in early research on combating spam and preventing denial-of-service attacks. One of the earliest implementations of PoW wasHashcash, created by British cryptographerAdam Back in 1997.[9] It was designed as an anti-spam mechanism that required email senders to perform a small computational task, effectively proving that they expended resources (in the form of CPU time) before sending an email. This task was trivial for legitimate users but would impose a significant cost on spammers attempting to send bulk messages.
Hashcash's system was based on the concept of finding a hash value that met certain criteria, a task that required computational effort and thus served as a "proof of work." The idea was that by making it computationally expensive to send large volumes of email,spamming would be reduced.
One popular system, used in Hashcash, uses partial hash inversions to prove that computation was done, as a goodwill token to send ane-mail. For instance, the following header represents about 252 hash computations to send a message tocalvin@comics.net on January 19, 2038:
X-Hashcash: 1:52:380119:calvin@comics.net:::9B760005E92F0DAE
It is verified with a single computation by checking that theSHA-1 hash of the stamp (omit the header nameX-Hashcash: including the colon and any amount of whitespace following it up to the digit '1') begins with 52 binary zeros, that is 13 hexadecimal zeros:[1]
0000000000000756af69e2ffbdb930261873cd71
Whether PoW systems can actually solve a particular denial-of-service issue such as the spam problem is subject to debate;[10][11] the system must make sending spam emails obtrusively unproductive for the spammer, but should also not prevent legitimate users from sending their messages. In other words, a genuine user should not encounter any difficulties when sending an email, but an email spammer would have to expend a considerable amount of computing power to send out many emails at once. Proof-of-work systems are being used by other, more complex cryptographic systems such as Bitcoin, which uses a system similar to Hashcash.[10]
Proof of work traces its theoretical origins to early efforts to combat digital abuse, evolving significantly over time to address security, accessibility, and broader applications beyond its initial anti-spam purpose. The idea first emerged in 1993 as a deterrent for junk mail, but it wasSatoshi Nakamoto’s 2008 whitepaper, "Bitcoin: A Peer-to-Peer Electronic Cash System,"[12] that solidified proof of work's potential as a cornerstone of blockchain networks. This development reflects the rising demands for secure, trustless systems.
The earliest appearance of proof of work was in 1993, whenCynthia Dwork andMoni Naor proposed a system to curb junk email by requiring senders to perform computationally demanding tasks. In their paper, "Pricing via Processing or Combatting Junk Mail,"[13] they outlined methods such as computing modular square roots, designed to be challenging to solve yet straightforward to verify, establishing a foundational principle of proof of work's asymmetry. This asymmetry is the crucial to the effectiveness of proof of work, ensuring that tasks like sending spam are costly for attackers, while verification remains efficient for legitimate users.
This conceptual groundwork found practical use in 1997 withAdam Back’s Hashcash, a system that required senders to compute a partial hash inversion of theSHA-1 algorithm, producing a hash with a set number of leading zeros. Described in Back’s paper "Hashcash: A Denial of Service Counter-Measure,"[14] Hashcash imposed a computational cost to deter spam while allowing recipients to confirm the work effortlessly, laying a critical foundation for subsequent proof of work implementations in cryptography and blockchain technology.
Bitcoin, launched in 2009 by Satoshi Nakamoto, marked a pivotal shift by adapting Hashcash's proof of work for cryptocurrency. Nakamoto's Bitcoin whitepaper outlined a system using theSHA-256 algorithm, where miners compete to solve cryptographic puzzles to append blocks to the blockchain, earning rewards in the process. Unlike Hashcash's static proofs, Bitcoin's proof of work algorithm dynamically adjusts its difficulty based on the average time taken to mine a block in the previous epoch, ensuring a consistent block time of approximately 10 minutes, creating a tamper-proof chain. This innovation transformed proof of work from a standalone deterrent into a consensus mechanism for a decentralized network, emphasizing financial incentives over computational effort.
Initially mined with standardCPUs, Bitcoin saw a rapid transition toGPUs, then toFPGAs and finally toASICs, which vastly outperformed general hardware in solving SHA-256 puzzles.
To address Bitcoin's increasing reliance on specialized hardware,Litecoin changed the Hashcash hash function from SHA-256 toScrypt. Developed byColin Percival and detailed in the technical specification "The scrypt Password-Based Key Derivation Function,"[15] Scrypt was designed as a memory-intensive algorithm, requiring a moderate amount of RAM to compute. Litecoin's goal of making mining more accessible to users with general-purpose hardware didn't last long, as mining followed a similar migration from CPUs through GPUs and FPGAs to ASICs.
There are two classes of proof-of-work protocols.


Known-solution protocols tend to have slightly lower variance than unbounded probabilistic protocols because the variance of arectangular distribution is lower than the variance of aPoisson distribution (with the same mean).[further explanation needed] A generic technique for reducing variance is to use multiple independent sub-challenges, as the average of multiple samples will have a lower variance.
There are also fixed-cost functions such as the time-lock puzzle.
Moreover, the underlying functions used by these schemes may be:
Finally, some PoW systems offershortcut computations that allow participants who know a secret, typically a private key, to generate cheap PoWs. The rationale is that mailing-list holders may generate stamps for every recipient without incurring a high cost. Whether such a feature is desirable depends on the usage scenario.
Here is a list of known proof-of-work functions:
At theIACR conference Crypto 2022 researchers presented a paper describing Ofelimos, a blockchain protocol with aconsensus mechanism based on "proof of useful work" (PoUW). Rather than miners consuming energy in solving complex, but essentially useless, puzzles to validate transactions, Ofelimos achieves consensus while simultaneously providing a decentralizedoptimization problem solver. The protocol is built around Doubly Parallel Local Search (DPLS), a local search algorithm that is used as the PoUW component. The paper gives an example that implements a variant ofWalkSAT, a local search algorithm to solve Boolean problems.[29]
In 2009, the Bitcoin network went online. Bitcoin is a proof-of-work digital currency that, like Finney's RPoW, is also based on the Hashcash PoW. But in Bitcoin, double-spend protection is provided by a decentralized P2P protocol for tracking transfers of coins, rather than the hardware trusted computing function used by RPoW. Bitcoin has better trustworthiness because it is protected by computation. Bitcoins are "mined" using the Hashcash proof-of-work function by individual miners and verified by the decentralized nodes in the P2P Bitcoin network. The difficulty is periodically adjusted to keep theblock time around a target time[30]

Since the creation of Bitcoin, proof-of-work has been the predominant design ofpeer-to-peer cryptocurrency. Studies have estimated the total energy consumption of cryptocurrency mining.[32] The PoW mechanism requires a vast amount of computing resources, which consume a significant amount of electricity. 2018 estimates from theUniversity of Cambridge equate Bitcoin's energy consumption to that ofSwitzerland.[5]
Each block that is added to the blockchain, starting with the block containing a given transaction, is called a confirmation of that transaction. Ideally, merchants and services that receive payment in the cryptocurrency should wait for at least one confirmation to be distributed over the network, before assuming that the payment was done. The more confirmations that the merchant waits for, the more difficult it is for an attacker to successfully reverse the transaction in a blockchain—unless the attacker controls more than half the total network power, in which case it is called a51% attack.[33]
Within the Bitcoin community there are groups working together inmining pools.[34] Some miners useapplication-specific integrated circuits (ASICs) for PoW.[35] This trend toward mining pools and specialized ASICs has made mining some cryptocurrencies economically infeasible for most players without access to the latest ASICs, nearby sources of inexpensive energy, or other special advantages.[36]
Some PoWs claim to be ASIC-resistant,[37] i.e. to limit the efficiency gain that an ASIC can have over commodity hardware, like a GPU, to be well under an order of magnitude. ASIC resistance has the advantage of keeping mining economically feasible on commodity hardware, but also contributes to the corresponding risk that an attacker can briefly rent access to a large amount of unspecialized commodity processing power to launch a51% attack against a cryptocurrency.[38]
By design, Bitcoin's Proof of Work consensus algorithm is vulnerable to Majority Attacks (51% attacks). Any miner with over 51% of mining power is able to control the canonical chain until their hash power falls below 50%. This allows them to reorg the blockchain, double-spend, censor transactions, and completely control block production.[39]
There was a notable double-spend onBitcoin in March 2013 when the chain split due to a bug in the Bitcoin 0.8.0 client. While on the 0.8.0 chain, a merchant (OKPAY) confirmed a $10k deposit from a customer. Bitcoin miners then 51% attacked the network, reverting 24 blocks and reversing the transaction leading to the customer's deposit. The customer then double-spent the bitcoin on the canonical pre-0.8.0 chain as an experiment.[40]
A 2025 paper by Duke University Finance Professor Campbell Harvey estimates that a week-long 51% attack on Bitcoin could be executed with only $6 Billion at Oct 2025 prices. The total cost of attack would be less than 1% of Bitcoin's total value. An attacker could profit from shorting Bitcoin or for non-economic reasons.[41]
Bitcoin has asymmetric security where Bitcoin miners control its security, but they aren't the same people who hold Bitcoin. Unlike with Proof of Stake, there is much weaker economic incentive for those who control security to protect the network under Proof of Work. Historically, many Proof of Work networks with low security budgets have fallen under 51% attacks.,[42] which highlights PoW's asymmetric security.
The amount of protection provided by PoW mining is close to the security budget of the network, which is roughly equal to the total block reward. With each additional halving, Bitcoin's security budget continues to fall relative to its market cap. In the past, Bitcoin developers were hopeful that transaction fees would rise to replace the declining block subsidy, but this has not been the case as transaction fees still only generate 1% of the total block reward.[43] There are concerns that Bitcoin's security is unsustainable in the long run due to the declining security budget caused by its halvings.
Miners compete to solve crypto challenges on the bitcoin blockchain, and their solutions must be agreed upon by all nodes and reach consensus. The solutions are then used to validate transactions, add blocks and generate new bitcoins. Miners are rewarded for solving these puzzles and successfully adding new blocks. However, the Bitcoin-style mining process is very energy intensive because the proof of work is shaped like a lottery mechanism. The underlying computational work has no other use but to provide security to the network that provides open access and has to work in adversarial conditions. Miners have to use a lot of energy to add a new block containing a transaction to the blockchain. The energy used in this competition is what fundamentally gives Bitcoin its level of security and resistance to attacks. Also, miners have to invest computer hardwares that need large spaces as fixed cost.[44]
In January 2022 vice-chair of theEuropean Securities and Markets Authority Erik Thedéen called on the EU to ban the proof of work model in favor of theproof of stake model due its lower energy emissions.[45]
In November 2022 the state ofNew York enacted a two-year moratorium on cryptocurrency mining that does not completely userenewable energy as a power source for two years. Existing mining companies will begrandfathered in to continue mining without the use of renewable energy but they will not be allowed to expand or renew permits with the state. No new mining companies that do not completely use renewable energy will be allowed to begin mining.[46]
echo -n 1:52:380119:calvin@comics.net:::9B760005E92F0DAE | openssl sha1{{cite journal}}: CS1 maint: DOI inactive as of July 2025 (link)the two best-known – and in the context of cryptocurrencies also most commonly used
{{citation}}: CS1 maint: work parameter with ISBN (link){{cite journal}}:Cite journal requires|journal= (help){{cite book}}: CS1 maint: location missing publisher (link)