Proofs of Space

作者: Stefan Dziembowski , Sebastian Faust , Vladimir Kolmogorov , Krzysztof Pietrzak

DOI: 10.1007/978-3-662-48000-7_29

关键词: Denial-of-service attackRandom oracleProofs involving the addition of natural numbersComputer securityDigital currencyMathematical proofHash functionService (business)Shared resourceComputer science

摘要: Proofs of work (PoW) have been suggested by Dwork and Naor (Crypto’92) as protection to a shared resource. The basic idea is ask the service requestor dedicate some non-trivial amount computational every request. original applications included prevention spam against denial attacks. More recently, PoWs used prevent double spending in Bitcoin digital currency system.

参考文章(55)
Ari Juels, John G. Brainard, Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks. network and distributed system security symposium. ,(1999)
Markus Jakobsson, Ari Juels, PROOFS OF WORK AND BREAD PUDDING PROTOCOLS (EXTENDED ABSTRACT) Springer US. pp. 258- 272 ,(1999) , 10.1007/978-0-387-35568-9_18
Giuseppe Ateniese, Ilario Bonacina, Antonio Faonio, Nicola Galesi, Proofs of Space: When Space Is of the Essence international conference on security and cryptography. pp. 538- 557 ,(2014) , 10.1007/978-3-319-10879-7_31
Nikolaos P. Karvelas, Aggelos Kiayias, Efficient Proofs of Secure Erasure international conference on security and cryptography. pp. 520- 537 ,(2014) , 10.1007/978-3-319-10879-7_30
Daniel R. Simon, Finding collisions on a one-way street: Can secure hash functions be based on general assumptions? theory and application of cryptographic techniques. pp. 334- 345 ,(1998) , 10.1007/BFB0054137
Matthew K Franklin, Dahlia Malkhi, None, Auditable Metering with Lightweight Security financial cryptography. pp. 151- 160 ,(1997) , 10.1007/3-540-63594-7_75
Phillip Rogaway, Formalizing Human Ignorance Progress in Cryptology - VIETCRYPT 2006. pp. 211- 228 ,(2006) , 10.1007/11958239_14
John R. Douceur, The Sybil Attack international workshop on peer to peer systems. pp. 251- 260 ,(2002) , 10.1007/3-540-45748-8_24
Daniele Perito, Gene Tsudik, Secure code update for embedded devices via proofs of secure erasure european symposium on research in computer security. pp. 643- 662 ,(2010) , 10.1007/978-3-642-15497-3_39