2020
DOI: 10.1007/978-3-030-45721-1_25
|View full text |Cite
|
Sign up to set email alerts
|

SPARKs: Succinct Parallelizable Arguments of Knowledge

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 36 publications
0
2
0
Order By: Relevance
“…In a recent work [31], the first memory-hard VDF construction was proposed by combining a SNARK with a parallelizable prover with a memoryhard "sequential" function. Although this result is close in spirit with what a VCBF tries to achieve, we do not aim for an explicit time lower bound, whereas 1 We stress that, in the setting of memory-hard functions, the term "memory" is used to denote the number of memory blocks required to correctly evaluate (in a given time) the function.…”
Section: Minimum Number Of Memory Accessmentioning
confidence: 99%
“…In a recent work [31], the first memory-hard VDF construction was proposed by combining a SNARK with a parallelizable prover with a memoryhard "sequential" function. Although this result is close in spirit with what a VCBF tries to achieve, we do not aim for an explicit time lower bound, whereas 1 We stress that, in the setting of memory-hard functions, the term "memory" is used to denote the number of memory blocks required to correctly evaluate (in a given time) the function.…”
Section: Minimum Number Of Memory Accessmentioning
confidence: 99%
“…Unfortunately, avoiding such outcomes is not easy, and in this work, we seek to strengthen our security definitions to avoid such issues. We do this in two ways: unlike [24], our definitions model the unforgeability period computationally -through the widelyadopted technique of bounding the number of sequential computation steps the adversary may compute [6,16,35,36,43]. While this still requires conversion when used in the real world, it does not embed the conversion into the security definition.…”
Section: Defining Time-deniable Signaturesmentioning
confidence: 99%
“…For our time lock puzzle, we modified an existing, open-source implementation of an RSW time-lock puzzle [25]. Our timestamp supports 2 16 different values which is approximately equivalent to what is supported by [40]. This is reasonable given at least some motivating applications (i.e.…”
Section: Implementation and Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…• SPARKs [44]: This work breaks the computation task into a sequence of smaller subtasks, and delegates the proof generation for the correctness of each sub-task to one server.…”
Section: Introductionmentioning
confidence: 99%