By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Integrating Useful Computation into Blockchain: PNPCoin’s Runtime and Compatibility Framework | HackerNoon
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Integrating Useful Computation into Blockchain: PNPCoin’s Runtime and Compatibility Framework | HackerNoon
Computing

Integrating Useful Computation into Blockchain: PNPCoin’s Runtime and Compatibility Framework | HackerNoon

News Room
Last updated: 2025/11/03 at 4:52 PM
News Room Published 3 November 2025
Share
Integrating Useful Computation into Blockchain: PNPCoin’s Runtime and Compatibility Framework | HackerNoon
SHARE

Table of Links

Abstract and 1. Introduction

  1. Volunteer Computing

  2. PNPCoin

    3.1 Blockchain Integration and 3.2 Bounded Complexity

    3.3 Runtime Authority and 3.4 Back-compatibility

  3. Use case – Cellular Docking

  4. Conclusion and References

3.1 Blockchain Integration

The PNPCoin proposal aims to replace the SHA256 hashing function at the core of Blockchain technology with useful computations. Instead of calculating the hash function of a randomized input, a one-way jash function is distributed at every block, and calculated instead of the hash. As in the original, results are shared by nodes communicating the hash of the blockchain, transactions are signed by new owners private keys, and timestamps are performed by distributed voting by proof-of-work.

The jash replaces the hash only in the proof-ofwork step. In order to achieve greater granularity than powers of two as Bitcoin does, the jash meta can contain an upper bound on the arg (eg.: n = 16 and max(arg)=47’000).

3.2 Bounded Complexity

Nested recursion among functions can be flattened into a single recursive function, and all recursive functions can be converted into unbounded loops. Loops which terminate after an unpredictable number of steps are replaced with for loops with a fixed upper bound, and a break statement is added for early termination. Figures 2 and 3 demonstrate this concept for the Collatz conjecture:

3.3 Runtime Authority

While Runtime Authority resources are available via peer to peer file hosting shared by research institutions and volunteers, the content is aggregated according to rules outlined here, a review process, and additional rules created by a committee. This

Figure 2: Unbounded complexity code

Figure 3: Conversion to bounded complexity

structure is similar to IANA, which manages Internet resources [2].

Each submitted jash is validated by checking whether it compiles, and estimating mean runtime and deviation by performing runs on random inputs. The functions are prioritized according to upper bound complexity (calculated at compile time), the upper bound time complexity, data size d, average and deviation runtime estimates, importance (0 to 1), and a veto to prevent malicious use. All but the last two criteria are fully automated, allowing fast turnaround.

There are two modes of execution for jash functions: full and optimal. Optimal execution accepts the lowest res, that is, the result with most leading zeros. Full execution returns the output of every valid input to the RA, and the reward is distributed evenly across all first submissions of results. The RA is also responsible for providing a reference node implementation.

3.4 Back-compatibility

In order to satisfy the requirements for a Soft Fork, the proposed system is compatible with the current SHA-256 hashes. For all historic blocks, the RA will publish jash functions containing the SHA256 hashes with fixed input, and empty meta files. In the future event that candidates are unavailable for computation, these Classic problems (SHA-256 hashes) will be published.

The RA aggregates all outputs of all sequences.

:::info
Author:

(1) Martin Kolar, Brno University of Technology ([email protected]).

:::


:::info
This paper is available on arxiv under CC BY 4.0 DEED license.

:::

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Panerai celebrates Chinese New Year with a unique take on the California dial | Stuff Panerai celebrates Chinese New Year with a unique take on the California dial | Stuff
Next Article Apple brings its App Store to the web Apple brings its App Store to the web
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Scientists spot the brightest flare yet from a supermassive black hole
News
IndraMind, Indra Group’s AI for citizen protection
IndraMind, Indra Group’s AI for citizen protection
Mobile
The Deception Problem: When AI Learns to Lie Without Being Taught | HackerNoon
The Deception Problem: When AI Learns to Lie Without Being Taught | HackerNoon
Computing
Off-grid EV chargers to get £10m funding boost – UKTN
Off-grid EV chargers to get £10m funding boost – UKTN
News

You Might also Like

The Deception Problem: When AI Learns to Lie Without Being Taught | HackerNoon
Computing

The Deception Problem: When AI Learns to Lie Without Being Taught | HackerNoon

29 Min Read
Operation SkyCloak Deploys Tor-Enabled OpenSSH Backdoor Targeting Defense Sectors
Computing

Operation SkyCloak Deploys Tor-Enabled OpenSSH Backdoor Targeting Defense Sectors

5 Min Read
Ransomware Defense Using the Wazuh Open Source Platform
Computing

Ransomware Defense Using the Wazuh Open Source Platform

15 Min Read
Intel’s LLM-Scaler Updated With OpenAI’s GPT-OSS Model Support
Computing

Intel’s LLM-Scaler Updated With OpenAI’s GPT-OSS Model Support

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?