메뉴 건너뛰기




Volumn 8642, Issue , 2014, Pages 538-557

Proofs of space: when space is of the essence

Author keywords

Pebbling Game; Proof of Work; Random Oracle Model; Space Complexity

Indexed keywords

CHROMIUM COMPOUNDS; COMPLEX NETWORKS; CRYPTOGRAPHY; NETWORK SECURITY;

EID: 84927645826     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-10879-7_31     Document Type: Conference Paper
Times cited : (89)

References (34)
  • 2
    • 77950803546 scopus 로고    scopus 로고
    • A guided tour puzzle for denial of service prevention
    • IEEE Computer Society
    • Abliz, M., Znati, T.: A guided tour puzzle for denial of service prevention. In: ACSAC, pp. 279-288. IEEE Computer Society (2009)
    • (2009) ACSAC, , pp. 279-288
    • Abliz, M.1    Znati, T.2
  • 3
    • 84927671041 scopus 로고    scopus 로고
    • Proofs of space: When space is of the essence. Cryptology ePrint Archive
    • Ateniese, G., Bonacina, I., Faonio, A., Galesi, N.: Proofs of space: When space is of the essence. Cryptology ePrint Archive, Report 2013/805 (2013), http://eprint.iacr.org/
    • (2013) Report 2013/805
    • Ateniese, G.1    Bonacina, I.2    Faonio, A.3    Galesi, N.4
  • 5
    • 72449185582 scopus 로고    scopus 로고
    • Proofs of storage from homomorphic identification protocols
    • In: Matsui, M. (ed.), Springer, Heidelberg
    • Ateniese, G., Kamara, S., Katz, J.: Proofs of storage from homomorphic identification protocols. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 319-333. Springer, Heidelberg (2009)
    • (2009) ASIACRYPT 2009. LNCS , vol.5912 , pp. 319-333
    • Ateniese, G.1    Kamara, S.2    Katz, J.3
  • 6
    • 14844310899 scopus 로고    scopus 로고
    • Hashcash-a denial of service counter-measure
    • Back, A.: Hashcash-a denial of service counter-measure. Technical report (2002)
    • (2002) Technical Report
    • Back, A.1
  • 8
    • 0023646410 scopus 로고
    • Does co-np have short interactive proofs? Inf. Process
    • Boppana, R.B., Hastad, J., Zachos, S.: Does co-np have short interactive proofs? Inf. Process. Lett. 25(2), 127-132 (1987)
    • (1987) Lett , vol.25 , Issue.2 , pp. 127-132
    • Boppana, R.B.1    Hastad, J.2    Zachos, S.3
  • 11
    • 77957002840 scopus 로고    scopus 로고
    • Improved Delegation of Computation Using Fully Homomorphic Encryption
    • In: Rabin, T. (ed.), Springer, Heidelberg
    • Chung, K.-M., Kalai, Y., Vadhan, S.: Improved Delegation of Computation Using Fully Homomorphic Encryption. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 483-501. Springer, Heidelberg (2010)
    • (2010) CRYPTO 2010. LNCS , vol.6223 , pp. 483-501
    • Chung, K.-M.1    Kalai, Y.2    Vadhan, S.3
  • 12
    • 35248835679 scopus 로고    scopus 로고
    • On memory-bound functions for fighting spam
    • In: Boneh, D. (ed.), Springer, Heidelberg
    • Dwork, C., Goldberg, A.V., Naor, M.: On memory-bound functions for fighting spam. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 426-444. Springer, Heidelberg (2003)
    • (2003) CRYPTO 2003. LNCS , vol.2729 , pp. 426-444
    • Dwork, C.1    Goldberg, A.V.2    Naor, M.3
  • 13
    • 84943235829 scopus 로고
    • Pricing via processing or combatting junk mail
    • In: Brickell, E.F. (ed.), Springer, Heidelberg
    • Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139-147. Springer, Heidelberg (1993)
    • (1993) CRYPTO 1992. LNCS , vol.740 , pp. 139-147
    • Dwork, C.1    Naor, M.2
  • 14
    • 33745136796 scopus 로고    scopus 로고
    • Pebbling and proofs of work
    • In: Shoup, V. (ed.), Springer, Heidelberg
    • Dwork, C., Naor, M., Wee, H.: Pebbling and proofs of work. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 37-54. Springer, Heidelberg (2005)
    • (2005) CRYPTO 2005. LNCS , vol.3621 , pp. 37-54
    • Dwork, C.1    Naor, M.2    Wee, H.3
  • 16
    • 80051978069 scopus 로고    scopus 로고
    • Key-evolution schemes resilient to spacebounded leakage
    • In: Rogaway, P. (ed.), Springer, Heidelberg
    • Dziembowski, S., Kazana, T., Wichs, D.: Key-evolution schemes resilient to spacebounded leakage. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 335-353. Springer, Heidelberg (2011)
    • (2011) CRYPTO 2011. LNCS , vol.6841 , pp. 335-353
    • Dziembowski, S.1    Kazana, T.2    Wichs, D.3
  • 17
    • 79953231613 scopus 로고    scopus 로고
    • One-time computable self-erasing functions
    • In: Ishai, Y. (ed.), Springer, Heidelberg
    • Dziembowski, S., Kazana, T., Wichs, D.: One-time computable self-erasing functions. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 125-143. Springer, Heidelberg (2011)
    • (2011) TCC 2011. LNCS , vol.6597 , pp. 125-143
    • Dziembowski, S.1    Kazana, T.2    Wichs, D.3
  • 18
    • 84927594927 scopus 로고    scopus 로고
    • Proofs of space and a greener bitcoin. Talk presented at Workshop on Leakage, Tampering and Viruses
    • Dziembowski, S., Pietrzak, K., Faust, S.: Proofs of space and a greener bitcoin. Talk presented at Workshop on Leakage, Tampering and Viruses, Warsaw 2013 (2013)
    • (2013) Warsaw , pp. 2013
    • Dziembowski, S.1    Pietrzak, K.2    Faust, S.3
  • 20
    • 0344794411 scopus 로고    scopus 로고
    • On the complexity of interactive proofs with bounded communication
    • Goldreich, O., Hastad, J.: On the complexity of interactive proofs with bounded communication. Information Processing Letters (1998)
    • (1998) Information Processing Letters
    • Goldreich, O.1    Hastad, J.2
  • 22
    • 84861587712 scopus 로고    scopus 로고
    • Client puzzles: A cryptographic countermeasure against connection depletion attacks
    • Juels, A., Brainard, J.G.: Client puzzles: A cryptographic countermeasure against connection depletion attacks. In: NDSS. The Internet Society (1999)
    • (1999) NDSS. The Internet Society
    • Juels, A.1    Brainard, J.G.2
  • 23
    • 84927615559 scopus 로고    scopus 로고
    • Efficient Proofs of Secure Erasure
    • In: Abdalla, M., De Prisco, R. (eds.), Springer, Heidelberg
    • Karvelas, N.P., Kiayias, A.: Efficient Proofs of Secure Erasure. In: Abdalla, M., De Prisco, R. (eds.) SCN 2014. LNCS, vol. 8642, pp. 526-543. Springer, Heidelberg (2014)
    • (2014) SCN 2014. LNCS , vol.8642 , pp. 526-543
    • Karvelas, N.P.1    Kiayias, A.2
  • 25
    • 84976818810 scopus 로고
    • Asymptotically tight bounds on time-space trade-offs in a pebble game
    • Lengauer, T., Tarjan, R.E.: Asymptotically tight bounds on time-space trade-offs in a pebble game. Journal of the ACM (JACM) 29(4), 1087-1130 (1982)
    • (1982) Journal of the ACM (JACM) , vol.29 , Issue.4 , pp. 1087-1130
    • Lengauer, T.1    Tarjan, R.E.2
  • 26
    • 0034854953 scopus 로고    scopus 로고
    • Computationally sound proofs
    • Micali, S.: Computationally sound proofs. SIAM Journal on Computing 30(4), 1253-1298 (2000)
    • (2000) SIAM Journal on Computing , vol.30 , Issue.4 , pp. 1253-1298
    • Micali, S.1
  • 27
    • 84927638086 scopus 로고    scopus 로고
    • Bitcoin: A peer-to-peer electronic cash system, May
    • Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (May 2009)
    • (2009)
    • Nakamoto, S.1
  • 28
    • 84868349605 scopus 로고    scopus 로고
    • Stronger key derivation via sequential memory-hard functions
    • Percival, C.: Stronger key derivation via sequential memory-hard functions. Presented at BSDCan 2009 (2009)
    • (2009) Presented at Bsdcan , pp. 2009
    • Percival, C.1
  • 29
    • 78049363496 scopus 로고    scopus 로고
    • Secure code update for embedded devices via proofs of secure erasure
    • In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.), Springer, Heidelberg
    • Perito, D., Tsudik, G.: Secure code update for embedded devices via proofs of secure erasure. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 643-662. Springer, Heidelberg (2010)
    • (2010) ESORICS 2010. LNCS, , vol.6345 , pp. 643-662
    • Perito, D.1    Tsudik, G.2
  • 30
    • 0001381109 scopus 로고
    • Superconcentrators. SIAM
    • Pippenger, N.: Superconcentrators. SIAM J. Comput. 6(2), 298-304 (1977)
    • (1977) J. Comput , vol.6 , Issue.2 , pp. 298-304
    • Pippenger, N.1
  • 31
    • 58349118819 scopus 로고    scopus 로고
    • Compact proofs of retrievability
    • In: Pieprzyk, J. (ed.), Springer, Heidelberg
    • Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90-107. Springer, Heidelberg (2008)
    • (2008) ASIACRYPT 2008. LNCS , vol.5350 , pp. 90-107
    • Shacham, H.1    Waters, B.2
  • 32
    • 84927614192 scopus 로고    scopus 로고
    • Near-linear time, leakage-resilient key evolution schemes from expander graphs
    • Smith, A., Zhang, Y.: Near-linear time, leakage-resilient key evolution schemes from expander graphs. IACR Cryptology ePrint Archive, 2013:864 (2013)
    • (2013) IACR Cryptology Eprint Archive , vol.2013 , pp. 864
    • Smith, A.1    Zhang, Y.2
  • 33
    • 0018052203 scopus 로고
    • Time-space tradeoffs for computing functions, using connectivity properties of their circuits
    • ACM, New York
    • Tompa, M.: Time-space tradeoffs for computing functions, using connectivity properties of their circuits. In: Proceedings of the Tenth Annual ACM Symposium on Theory of Computing, STOC 1978, pp. 196-204. ACM, New York (1978)
    • (1978) Proceedings of the Tenth Annual ACM Symposium on Theory of Computing, STOC 1978 , pp. 196-204
    • Tompa, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.