Spacemint: A Cryptocurrency Based on Proofs of Space.

作者: Joël Alwen , Peter Gazi , Georg Fuchsbauer , Sunoo Park , Krzysztof Pietrzak

DOI:

关键词: ExploitMathematical proofComputer securityCurrencyProtocol (object-oriented programming)Space (commercial competition)Computer scienceDatabase transactionCryptocurrencyBlock (data storage)

摘要: Since its introduction in 2009, Bitcoin has become the most successful cryptocurrency ever deployed. However, currency’s dramatic expansion also raised serious concerns about long-term sustainability: (1) mining dynamics have shifted away from decentralization, as dedicated hardware and entry of governments energy producers gradually placed power hands a select few, (2) network’s growth spurt come with accompanying, vast amounts constantly “wasted” solely for purpose sustaining currency. In this work, we propose SpaceMint, based on proofs space instead wasteful work. Mining SpaceMint is designed to low setup overhead costs, yielding fairer reward structure small large miners. Miners dedicate disk rather than computation. our design, adapt proof-of-space setting, new block chain format transaction types that prevent attacks exploit inexpensiveness (from which alternative non-proof-of-work-based proposals suffered). Our prototype shows initializing 1 TB takes day (a oneoff cost), miners average spend just fraction second per mined. We provide formal game-theoretic analysis modeling ∗In previous version, proposal was called “Spacecoin” “SpaceMint”, but been changed due name conflicts. an extensive game, prove following protocol equilibrium, thereby arguing stability consensus.

参考文章(26)
Giuseppe Ateniese, Ilario Bonacina, Antonio Faonio, Nicola Galesi, Proofs of Space: When Space Is of the Essence international conference on security and cryptography. pp. 538- 557 ,(2014) , 10.1007/978-3-319-10879-7_31
Nikolaos P. Karvelas, Aggelos Kiayias, Efficient Proofs of Secure Erasure international conference on security and cryptography. pp. 520- 537 ,(2014) , 10.1007/978-3-319-10879-7_30
Daniele Perito, Gene Tsudik, Secure code update for embedded devices via proofs of secure erasure european symposium on research in computer security. pp. 643- 662 ,(2010) , 10.1007/978-3-642-15497-3_39
Stefan Dziembowski, Tomasz Kazana, Daniel Wichs, One-time computable self-erasing functions theory of cryptography conference. pp. 125- 143 ,(2011) , 10.1007/978-3-642-19571-6_9
Meni Rosenfeld, Analysis of Hashrate-Based Double Spending arXiv: Cryptography and Security. ,(2014)
Cynthia Dwork, Moni Naor, Pricing via Processing or Combatting Junk Mail international cryptology conference. pp. 139- 147 ,(1992) , 10.1007/3-540-48071-4_10
Andrew Miller, Ari Juels, Elaine Shi, Bryan Parno, Jonathan Katz, Permacoin: Repurposing Bitcoin Work for Data Preservation ieee symposium on security and privacy. pp. 475- 490 ,(2014) , 10.1109/SP.2014.37
M. Hellman, A cryptanalytic time-memory trade-off IEEE Transactions on Information Theory. ,vol. 26, pp. 401- 406 ,(1980) , 10.1109/TIT.1980.1056220
Christian Decker, Roger Wattenhofer, Information propagation in the Bitcoin network international conference on peer-to-peer computing. pp. 1- 10 ,(2013) , 10.1109/P2P.2013.6688704
Kevin D. Bowers, Ari Juels, Alina Oprea, Proofs of retrievability: theory and implementation ieee international conference on cloud computing technology and science. pp. 43- 54 ,(2009) , 10.1145/1655008.1655015