Generally, users are required to perform some complicated operations that consume a proper amount of time, and the answers can be quickly checked by service providers, thus taking the consumed time, equipment and energy as the guarantee cost to ensure that services and resources are used by real needs.
special technology
The most commonly used technical principle of workload proof is hash function. Because any value n of the input hash function H () will correspond to the result of h(n), and the change of N by one bit will cause avalanche effect, it is almost impossible to deduce N from h(n). Therefore, by specifying the characteristics of finding h(n), users can perform a large number of exhaustive operations, and the workload can be proved.