2020
DOI: 10.1145/3396374
|View full text |Cite
|
Sign up to set email alerts
|

Foundations, Properties, and Security Applications of Puzzles

Abstract: Cryptographic algorithms have been used not only to create robust ciphertexts but also to generate cryptograms that, contrary to the classic goal of cryptography, are meant to be broken. These cryptograms, generally called puzzles, require the use of a certain amount of resources to be solved, hence introducing a cost that is often regarded as a time delay—though it could involve other metrics as well, such as bandwidth. These powerful features have made puzzles the core of many security protocols, acquiring i… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 24 publications
(10 citation statements)
references
References 76 publications
0
10
0
Order By: Relevance
“…• Agreement: the decision values of all the correct processes are the same; • Integrity 2 : if the correct processes all proposed the same value v, then any correct process has set its decision variable to v; • Termination: eventually each correct process sets its decision variable. In the remaining part of this section we give a brief review of how standard ADS systems work and provide an overview on how we can build an ADS on top of the meta-data leveraged by a blockchain running a proof-of-work like [10] consensus protocol that generates local meta-data discarded at the time of block creation. We refer the reader to [7] for a formal and more complete treatment of blockchain's protocols.…”
Section: A Blockchain Technologymentioning
confidence: 99%
“…• Agreement: the decision values of all the correct processes are the same; • Integrity 2 : if the correct processes all proposed the same value v, then any correct process has set its decision variable to v; • Termination: eventually each correct process sets its decision variable. In the remaining part of this section we give a brief review of how standard ADS systems work and provide an overview on how we can build an ADS on top of the meta-data leveraged by a blockchain running a proof-of-work like [10] consensus protocol that generates local meta-data discarded at the time of block creation. We refer the reader to [7] for a formal and more complete treatment of blockchain's protocols.…”
Section: A Blockchain Technologymentioning
confidence: 99%
“…We define resource burning as the verifiable consumption of a resource. In particular, it is computationally easy to verify both the consumption of the resource, and also the ID that consumed the resource [6]. Below we describe several resource-burning techniques.…”
Section: What Is Resource Burning?mentioning
confidence: 99%
“…Finding a hash that meets a preset target is an example of a puzzle [3]. Long before rising to prominence with the Bitcoin boom, PoW schemes implemented in client puzzle protocols (CPPs) have been proposed as a deterrent to SPAM [4], [5] and as a protection from Denial-of-Service (DoS) attacks against internet facing servers [6], [7].…”
Section: Introductionmentioning
confidence: 99%
“…Some of the most popular underlying puzzles are based on prime modulo operations [4], [8]- [10], partial hash inversions [5]- [7], [11], [12], and memory intensive computations [13]- [17]. (See [3] for a recent review of puzzle types; for a review of PoW schemes applied to blockchain technology, see [18]. )…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation