Miner Identification and Digital Signatures

When a transaction is created, it is sent to the mining nodes on the network. These nodes check whether the transaction is valid and then compete to include it in a new block. Mining means solving a complex computational puzzle, which requires significant resources.
A block is simply a group of validated transactions that are timestamped together. Once a node finds the solution, it shares the block with the rest of the network.
How Consensus Works
Multiple nodes (also called miners) compete to mine each block.
They are highly connected to reduce communication delays.
When a node finds the solution, it broadcasts its block.
Other nodes verify the Proof of Work and the transactions inside.
If the block is valid, it is added to the blockchain. Other miners then confirm acceptance by building new blocks on top of it, linking them through hash-based dependencies.
This process is known as the consensus mechanism. It combines competition with cooperation.
Miner Rewards
The winning miner includes a special transaction called the coinbase transaction. This allows the miner to pay themselves the reward.
Block rewards: Newly created coins.
Transaction fees: Paid by users who sent transactions.
Identifying Miners
Because blocks are validated and confirmed publicly, miners can be identified. Currently, there are two main ways:
Coinbase identity data – Miners may add identity information to their coinbase transaction. However, this can be spoofed and isn’t always reliable.
MinerID protocol – A cryptographic system that provides miners with a verifiable digital identity.
The MinerID Protocol
The MinerID protocol gives each miner a unique cryptographic identifier. It uses ECDSA (secp256k1), the same algorithm used for Bitcoin’s digital signatures.
A miner generates a public/private key pair.
The public key acts as the miner’s identifier.
The private key is used to sign metadata in the coinbase transaction output of blocks they mine.
This allows the network to:
Verify that a block really came from the miner claiming it.
Prevent impersonation and malicious attacks.
Strengthen overall network security through message authentication.
For more details, see the MinerID documentation.
FYI
Teranode will have new ways for miners to be identified as well.
Key Takeaway
The MinerID protocol ensures that miners can be cryptographically verified, not just identified by untrusted text in a transaction. By combining digital signatures with the mining process, the BSV blockchain achieves both security and accountability.
Last updated
