2016
DOI: 10.1007/978-3-662-53890-6_30
|View full text |Cite
|
Sign up to set email alerts
|

Indistinguishable Proofs of Work or Knowledge

Abstract: We introduce a new class of protocols called Proofs of Work or Knowledge (PoWorKs). In a PoWorK, a prover can convince a verifier that she has either performed work or that she possesses knowledge of a witness to a public statement without the verifier being able to distinguish which of the two has taken place. We formalize PoWorK in terms of three properties, completeness, f -soundness and indistinguishability (where f is a function that determines the tightness of the proof of work aspect) and present a cons… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 49 publications
0
9
0
Order By: Relevance
“…When we consider a function = id, we refer to the identity function. We adapt and extend the model from [3] to formalize the notion of PoW. Roughly speaking, a PoW system allows to generate cryptographic puzzles that are easy to generate, hard to solve, and whose potential solutions are easy to verify.…”
Section: Preliminaries 21 Notationsmentioning
confidence: 99%
See 2 more Smart Citations
“…When we consider a function = id, we refer to the identity function. We adapt and extend the model from [3] to formalize the notion of PoW. Roughly speaking, a PoW system allows to generate cryptographic puzzles that are easy to generate, hard to solve, and whose potential solutions are easy to verify.…”
Section: Preliminaries 21 Notationsmentioning
confidence: 99%
“…To generate a block, miners must find a block header that represents the solution of a PoW and include it (as well as the additional fields) into a new block, allowing any entity to verify the PoW. Upon successfully generating a block, a miner is granted a monetary reward (i.e., in the form of a coinbase transaction 3 that specifies the ID of the recipient of the reward). The resulting block is forwarded to all peers in the network, who can then check its correctness by verifying the hash computation.…”
Section: Mining Pool Protocolsmentioning
confidence: 99%
See 1 more Smart Citation
“…Rather than using computer power as a scarce resource to generate security, Proof of Stake uses the scarcity of the coin itself. Therefore nodes that participate in a PoS consensus protocol are more commonly referred to as forgers instead of miners [9,76].…”
Section: Proof-of-stake (Pos)mentioning
confidence: 99%
“…This concept can also be linked to the proof of work or knowledge presented in [BKZZ16]. It is a proof of work where a solution can be found in a more efficient way if a secret is known.…”
Section: Generic Asymmetric Hardnessmentioning
confidence: 99%