Browse Definitions :
Definition

proof of stake (PoS)

What is proof of stake (PoS)?

Proof of stake (PoS) is an approach used in the cryptocurrency industry to help validate transactions.

When a transaction occurs with a cryptocurrency, a corresponding change on the blockchain on which the cryptocurrency is based needs to occur. All cryptocurrencies use blockchain technology at the foundation, providing a distributed ledger of transactions. Blockchain provides a set of distributed nodes in a decentralized approach and validating that a transaction has occurred requires some form of consensus to ensure integrity.

Validating transactions to the cryptocurrency's blockchain ledger can occur in many different distributed approaches known as consensus algorithms, including PoS and proof of work (PoW). Both methods achieve the same result of validating a transaction by adding a new block to the underlying blockchain of the cryptocurrency. While the two consensus mechanisms have the same result, they work in different ways.

As a consensus algorithm, PoS uses validators that have a specific stake, which is a minimum amount of cryptocurrency tokens on the blockchain. The stake held by validators is locked into a smart contract on the cryptocurrency's blockchain to help maintain the required amount of cryptocurrency tokens.

Validators are rewarded by the cryptocurrency, typically with new tokens for participating in the PoW effort. If a validator fails to properly validate a transaction, the stake can be at risk from a reactive action known as slashing, whereby several tokens are revoked.

Proof of stake vs. proof of work

Both PoS and PoW are consensus mechanisms for cryptocurrency nodes on blockchain. The method by which the two consensus approaches work varies significantly.

In the PoW approach, the consensus is achieved when an individual node writes the next block in the blockchain to validate the transaction by solving a cryptographic hash in an operation referred to as mining. The process of writing the new block in a blockchain can require significant computing power and energy consumption. PoW was outlined by Bitcoin creator Satoshi Nakamoto in the initial paper released in 2008 that defined the Bitcoin model. It remains the consensus mechanism used by Bitcoin today.

With PoS, consensus is achieved by validators that provide a deposit -- known as a stake -- in the specific cryptocurrency used. PoS requires significantly less energy and computing power than the PoW approach. PoS also has the potential to be faster than PoW, as well as provide more scalability because it requires less computing power to achieve consensus and validate a transaction. PoS was pioneered by the Peercoin cryptocurrency group in 2012.

proof of work vs. proof of stake
There are pros and cons to both proof of work and proof of stake.

Benefits of proof of stake

The PoS consensus mechanism offers several benefits to the cryptocurrency platforms that support the approach, including the following:

  • Smaller resource requirements. The ability to add a node to the blockchain, requires less computing power.
  • Lower energy utilization. With the need for less computing power comes a corresponding decline in the amount of energy consumed in order to validate a transaction.
  • Speed. A node can be added quicker with PoS, enabling faster transaction throughput.
  • Scalability. The PoS-based approach has the potential to be more scalable than PoW as the requirements and resources to have a stake may be lower than the hardware and energy costs of PoW.

Challenges of proof of stake

While there are numerous benefits to using PoS, there are some challenges, including the following:

  • Potential for undue influence. A key promise of cryptocurrencies is that they are decentralized. With the need to stake coins, it is possible that a large stakeholder could exert significant influence on the validation of transactions on a blockchain network.
  • Staking conditions. With PoS, it is possible that the stake will be tied up in a smart contract for a longer period.
  • Security concerns. There are concerns that PoS is less secure as there is less effort required for validation and the potential for influence from large stakeholders. PoS also does not have the same volume of transactions or history as PoW, and as such has not yet been tested at the same scale.

Proof of stake cryptocurrencies

In the ever-growing world of cryptocurrencies, there is an expanding list of those that use PoS as a consensus mechanism, including the following:

  • Avalanche (AVAX). Avalanche aims to help enable the development of dApps (decentralized applications) and was created in September 2020.
  • Cardano (ADA). Cardano provides smart contract capabilities and was founded in 2015 by the co-founder of Ethereum, Charles Hoskinson.
  • Cosmos (ATOM). Cosmos was created by the Interchain Foundation (ICF) in 2014 to build an open source blockchain technology.
  • EOS (EOS). EOS has its own blockchain that was first publicly released in January 2018 with the aim of accelerating smart contracts.
  • Ethereum (ETH). Ethereum is one of the most widely owned and used cryptocurrencies and moved to PoS in September 2022.
  • Peercoin (PPC). Peercoin claims to have been the first to implement the PoS approach and got its start in 2012.
  • Solana (SOL). Solana launched in 2017 and aims to be an efficient platform for transaction processing.
This was last updated in September 2022

Continue Reading About proof of stake (PoS)

Networking
  • subnet (subnetwork)

    A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an IP ...

  • Transmission Control Protocol (TCP)

    Transmission Control Protocol (TCP) is a standard protocol on the internet that ensures the reliable transmission of data between...

  • secure access service edge (SASE)

    Secure access service edge (SASE), pronounced sassy, is a cloud architecture model that bundles together network and cloud-native...

Security
  • cyber attack

    A cyber attack is any malicious attempt to gain unauthorized access to a computer, computing system or computer network with the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a digital document, message or...

  • What is security information and event management (SIEM)?

    Security information and event management (SIEM) is an approach to security management that combines security information ...

CIO
  • product development (new product development)

    Product development -- also called new product management -- is a series of steps that includes the conceptualization, design, ...

  • innovation culture

    Innovation culture is the work environment that leaders cultivate to nurture unorthodox thinking and its application.

  • technology addiction

    Technology addiction is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video ...

HRSoftware
  • organizational network analysis (ONA)

    Organizational network analysis (ONA) is a quantitative method for modeling and analyzing how communications, information, ...

  • HireVue

    HireVue is an enterprise video interviewing technology provider of a platform that lets recruiters and hiring managers screen ...

  • Human Resource Certification Institute (HRCI)

    Human Resource Certification Institute (HRCI) is a U.S.-based credentialing organization offering certifications to HR ...

Customer Experience
  • contact center agent (call center agent)

    A contact center agent is a person who handles incoming or outgoing customer communications for an organization.

  • contact center management

    Contact center management is the process of overseeing contact center operations with the goal of providing an outstanding ...

  • digital marketing

    Digital marketing is the promotion and marketing of goods and services to consumers through digital channels and electronic ...

Close