2011
DOI: 10.1080/00207160.2010.543951
|View full text |Cite
|
Sign up to set email alerts
|

Towards a security model for computational puzzle schemes

Abstract: In the literature, computational puzzle schemes have been considered as a useful tool for a number of applications, such as constructing timed cryptography, fighting junk emails, and protecting critical infrastructure from denial-of-service (DoS) attacks. However, there is a lack of a general security model for studying these schemes. In this paper, we propose such a security model and formally define two properties, namely the determinable difficulty property and the parallel computation resistance property. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…A similar concept is given by Dwork and Naor [9] with the notion of pricing function to combat junk emails, and by Rivest, Shamir, and Wagner [17] with the notion of timed-lock puzzle as a tool to realize timedrelease crypto. Client puzzles are expected to be unforgeable and difficult to solve [18] and possibly to have determinable difficulty and parallel computation resistance [19].…”
Section: Related Workmentioning
confidence: 99%
“…A similar concept is given by Dwork and Naor [9] with the notion of pricing function to combat junk emails, and by Rivest, Shamir, and Wagner [17] with the notion of timed-lock puzzle as a tool to realize timedrelease crypto. Client puzzles are expected to be unforgeable and difficult to solve [18] and possibly to have determinable difficulty and parallel computation resistance [19].…”
Section: Related Workmentioning
confidence: 99%
“…They have mentioned in their research work that not only wired networks, but also wireless networks are prone to DDoS attacks. Qiang Tang et.al have proposed a security architecture where he concentrated on two properties, regarding the determinable difficulty and the parallel computation resistance [5]. Yves Igor et.al introduces a client puzzle mechanism where the generation of puzzle is dependent on calculating of square roots modulo with a prime [6].…”
Section: Literature Surveymentioning
confidence: 99%
“…Malicious Users [7] [8] [9] 5 Conclusion Figure 1: Outline of the thesis Most existing secure computation protocols for recommender systems require interaction between the service provider and its users, which makes unavailability of users a serious issue (particularly in the case of collaborative filtering). When this issue is not addressed, the efficiency of the recommender system becomes dependent on the availability of the users.…”
Section: Research Questionsmentioning
confidence: 99%