Transactions as Proof-of-Stake & The End of Mining http://the-iland.net/static/downloads/TransactionsAsProofOfStake.pdfThe concept behind Proof-of-Stake is that a block chain should be secured by those with a financial interest in the chain. This paper will introduce a new approach to Proof-of-Stake that utilizes coin-days-destroyed by every transaction as a substitute for the vast majority of the security currently provided by Proof-of-Work. Unlike prior Proof-of-Stake systems in which only some nodes contribute to the proof-of-stake calculation, we present a new approach to Proof-of-Stake whereby all nodes generating transactions contribute to the security of the network. The result is that the network immune to known attacks against Bitcoin or Peercoin.
Every transaction on the network carries with it an implicit Proof-of-Stake in the network. The creator of the transaction wants the network to accept it and the receiver of the transaction is making decisions on whether or not to ship goods based upon whether or not the network has accepted the transaction. It is clear that those behind the transaction have a stake in the health of the network. After all, the network is worthless if transactions cannot be executed as expected. A well functioning network will have thousands of transactions every single block. This represents thousands of stake holders who could be contributing to the security of the network.
In order for a 51% attack to be successful in a Proof-of-Work system, the attacker must keep their alternative chain secret. Once they have locked in the profits from their first spend, they can broadcast the longer secret block chain which will invalidate the original transaction. Keeping solved blocks secret is also used in the selfish-mining attack which can be effective with much less than 51% of the hashing power.
In order to prevent this kind of behavior we must make it impractical for miners to maintain secret block chains. If every transaction that is broadcast contains the hash of a recent block and the block chain enforces the rule that the transaction can only be included in block chains that build off of that block then no one will be able to build secret block chains that leverage the coin-days-destroyed of transactions in the public chain.
So the basic idea is that the more coin-days destroyed in a given block, the lower the difficulty. But even if someone had enough computing power to find blocks that only destroyed a few coin-days, their chain would still be rejected, because proof of stake is used as the primary judge of chain size, not proof of work. Therefore, the fastest growing chain will be the one that includes the most transactions, which keeps the network healthy.
Please read my paper for further details, but I believe that I have a Proof-of-Stake system that requires no explicit mining and for which mining is never 'profitable'. If the security model holds review then this could dramatically change the future of all DACs and crypto-currencies, eliminate mining pools, lucky mining, vesting, ASICs, the 51% attack, selfish-mining, merged-mining, denial of service, etc.
Please review and give me your feedback.