Proofs of Space
From MaRDI portal
Publication:3457086
DOI10.1007/978-3-662-48000-7_29zbMath1369.94531OpenAlexW2295804537MaRDI QIDQ3457086
Vladimir Kolmogorov, Stefan Dziembowski, Krzysztof Pietrzak, Sebastian Faust
Publication date: 10 December 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://repository.ist.ac.at/671/1/796.pdf
Related Items (19)
Consensus in Data Management: From Distributed Commit to Blockchain ⋮ Static-memory-hard functions, and modeling the cost of space vs. time ⋮ Proof of Space from Stacked Expanders ⋮ Designing Proof of Human-Work Puzzles for Cryptocurrency and Beyond ⋮ Resource Burning for Permissionless Systems (Invited Paper) ⋮ An incremental PoSW for general weight distributions ⋮ Verifiable capacity-bound functions: a new primitive from Kolmogorov complexity. (Revisiting space-based security in the adaptive setting) ⋮ Permissionless and asynchronous asset transfer ⋮ A comprehensive review on blockchains for Internet of Vehicles: challenges and directions ⋮ Ofelimos: combinatorial optimization via proof-of-useful-work. A provably secure blockchain protocol ⋮ Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks ⋮ SNACKs: leveraging proofs of sequential work for blockchain light clients ⋮ Individual cryptography ⋮ On elapsed time consensus protocols ⋮ Decentralizing information technology: the advent of resource based systems ⋮ Minting mechanism for proof of stake blockchains ⋮ Proofs of Catalytic Space ⋮ Depth-Robust Graphs and Their Cumulative Memory Complexity ⋮ Scrypt Is Maximally Memory-Hard
Cites Work
- Formalizing Human Ignorance
- Cryptographic Primitives Enforcing Communication and Storage Complexity
- One-Time Computable Self-erasing Functions
- Secure Code Update for Embedded Devices via Proofs of Secure Erasure
- Universal Arguments and their Applications
- A cryptanalytic time-memory trade-off
- Asymptotically tight bounds on time-space trade-offs in a pebble game
- On Time Versus Space
- Computationally Sound Proofs
- Key-Evolution Schemes Resilient to Space-Bounded Leakage
- Pebbling and Proofs of Work
- Mitigating Dictionary Attacks on Password-Protected Local Storage
This page was built for publication: Proofs of Space