Blockchain 10 min read

Understanding Proof of Work, Proof of Stake, and Bitcoin Wallet Basics

This article explains the fundamentals of Proof of Work and Proof of Stake consensus mechanisms, compares their advantages and drawbacks, and introduces Bitcoin wallet types along with the step‑by‑step process of generating mnemonic phrases for hierarchical deterministic wallets.

JavaEdge
JavaEdge
JavaEdge
Understanding Proof of Work, Proof of Stake, and Bitcoin Wallet Basics

1 Proof of Work (PoW)

Proof of Work is a consensus mechanism that requires nodes to solve complex computational puzzles (mining) to prove they have contributed work, ensuring only valid blocks are added to the blockchain. It is the first‑generation consensus used by Bitcoin, rewarding miners proportionally to the amount of work performed.

2 How PoW Works

All nodes can freely participate in block creation. When a transaction occurs, every node that wants to record it must compete using its computing power. The node that first solves the puzzle gains the right to package the block, which is then linked to the chain and broadcast to the network for verification.

Each node can package blocks.

Nodes compete for the right to record transactions.

The winning node’s block is appended to the chain and recognized by all other nodes.

The core technical principle is hashing. Given input data r, the hash function produces R = Hash(r). A small change in r drastically changes R. In Bitcoin’s PoW, a difficulty d and a random nonce n are introduced, requiring the hash result to have the first d bytes equal to zero.

Because the hash output is unpredictable, miners must perform many hash attempts before finding a valid nonce. Once a miner discovers a qualifying hash, it broadcasts the result; other nodes only need a single hash computation to verify it.

3 PoW Model in Bitcoin

Every transaction is broadcast to all nodes. A block must contain at least 500 transactions, each at least 250 bytes, and the block size limit is 2 MB. Mining involves running software that listens for transaction broadcasts, performs the PoW calculation, and, upon finding a valid hash, broadcasts it to claim the right to record the block and receive the reward.

Other nodes verify the block by checking the nonce; only one hash computation is needed, making verification fast.

4 Advantages of PoS (Proof of Stake)

Resource Efficiency

PoS does not require energy‑intensive mining.

Greater Decentralization

Attacking a PoS network would require purchasing a majority of the token supply, which is often more costly than a 51 % hash‑power attack on PoW.

Inflation Control

PoS can issue new tokens at a fixed annual rate, helping maintain monetary stability.

5 Disadvantages of PoS

Early PoS tokens are often concentrated in the genesis block, necessitating distribution phases (e.g., an initial PoW stage followed by PoS). Developers may issue tokens via IPO, leading to a few holders acquiring large amounts at low cost, which can cause market sell‑offs.

Token age can enable long‑term holders to accumulate voting power, potentially facilitating attacks. Low‑cost operations in PoS also make chain splits easier.

6 Bitcoin Wallet Types

A Bitcoin wallet can refer to a software application or a file that stores private keys. Wallets fall into two categories:

Non‑deterministic wallets: each key pair is generated independently.

Deterministic (HD) wallets: all keys are derived from a single seed phrase.

With a deterministic wallet, remembering the seed phrase is sufficient to regenerate all associated keys, typically using a hierarchical tree structure.

7 How HD Wallet Mnemonics Are Generated

Generate a random entropy sequence of 128–256 bits.

Hash the entropy and take the first n bits (where n = entropy length / 32) as a checksum.

Append the checksum to the entropy.

Split the combined bit string into 11‑bit groups.

Map each 11‑bit group to a word from the predefined wordlist.

The resulting list of words forms the mnemonic phrase.

Mnemonic generation diagram
Mnemonic generation diagram
Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

ConsensusBitcoinProof of WorkWalletProof of Stake
JavaEdge
Written by

JavaEdge

First‑line development experience at multiple leading tech firms; now a software architect at a Shanghai state‑owned enterprise and founder of Programming Yanxuan. Nearly 300k followers online; expertise in distributed system design, AIGC application development, and quantitative finance investing.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.