“…Some proof-based algorithms have made attempts to lower resource usage during mining, most notably, proof-of-stake, proof-of-importance (Bentov et al, 2016;NEM, 2018;Zheng et al, 2017) and delegated proof-of-stake (BitShares Blockchain Foundation, n.d.; Hasib, 2018). There have also been attempts to exchange energy for other resources during the mining process, these types of solutions include PoW with a cuckoo hash function (relies on memory rather than computational power) (Tromp, 2014), proof-of-human-work (requires inputs that are easy for humans to provide, but difficult for computers) (Blocki & Zhou, 2016), proof-of-burn (uses blockchain tokens) (Jenks, 2018;P4Titan, 2014), proof-ofspace (relies on data storage capacity) (Dziembowski et al, 2015), proof-of-entanglement (depends on the quantum properties of light) (Bennet & Daryanoosh, 2019), proof-of-elapsed time and proof-of-luck (uses centralised random number generation) (Nguyen & Kim, 2018) and proof-of-responsibility (relies on trusted nodes) (Coinspace.com, 2019).…”