摘要: We present a computational technique for combatting junk mail in particular and controlling access to shared resource general. The main idea is require user compute moderately hard, but not intractable, function order gain the resource, thus preventing frivolous use. To this end we suggest several pricing Junctions, based on, respectively, extracting square roots modulo prime, Fiat-Shamir signature scheme, Ong-Schnorr-Shamir (cracked) scheme.