Blockchain is a nifty breakthrough in the field of computer technology, that spans over the varied components that bricks up the wired web and transpires as the new hysteria in the digital world of revolution. The novel approach of Bitcoin is an intuitive paradigm shift of the conventional modus operandi of cryptocurrency and digital cash. This paper unravels the niceties woven around the working of the Blockchain and focuses in detail the meticulous functionality of the Bitcoin mining that builds the chain of blocks agreed in a consensus. The global community of inclusion, an invitation to participate in an open world free of centralized authority and dominion, ruling out the prevalence and interdependence of the middle intermediaries is the core constraints that mitigate the elaboration............
Key words: Blockchain, Bitcoin Mining, Proof of Work, Proof of Stake, Smart Contracts, Distributed Cryptocurrency, DAO, Consensus Algorithms, Applications of Blockchain.
[1]. Narayanan, A., & Clark, J. (2017). Bitcoin's academic pedigree. Communications of the ACM, 60(12), 36-45.
[2]. Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system Garay, J., Kiayias, A., & Leonardos, N. (2015, April). The Bitcoin backbone protocol: Analysis and applications. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 281-310). Springer, Berlin, Heidelberg.
[3]. Garay, J., Kiayias, A., & Leonardos, N. (2017, August). The Bitcoin backbone protocol with chains of variable difficulty. In Annual International Cryptology Conference (pp. 291-323). Springer, Cham.
[4]. Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J. A., & Felten, E. W. (2015, May). Sok: Research perspectives and challenges for Bitcoin and cryptocurrencies. In 2015 IEEE Symposium on Security and Privacy (pp. 104-121). IEEE.
[5]. Pass, R., Seeman, L., & Shelat, A. (2017, April). Analysis of the Blockchain protocol in asynchronous networks. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 643-673). Springer, Cham.