How to Prove Work: With Time or Memory

Proposed by Dwork and Naor (Crypto&#x2019; 92) as an anti-spam technique, proof-of-work is attracting more attention with the boom of cryptocurrencies. A proof-of-work scheme involves two types of participants, <inline-formula> <tex-math notation="LaTeX">$\textit {i.e.}$ &l...

Full description

Bibliographic Details
Main Authors: Xiangyu Su, Mario Larangeira, Keisuke Tanaka
Format: Article
Language:English
Published: IEEE 2022-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9663157/
Description
Summary:Proposed by Dwork and Naor (Crypto&#x2019; 92) as an anti-spam technique, proof-of-work is attracting more attention with the boom of cryptocurrencies. A proof-of-work scheme involves two types of participants, <inline-formula> <tex-math notation="LaTeX">$\textit {i.e.}$ </tex-math></inline-formula>, provers and verifiers. Provers are asked to solve a computational puzzle, and verifiers need to check the solution&#x2019;s correctness. A widely adopted hash-based construction achieves an optimal gap in computational complexity between provers and verifiers. However, in industry, proof-of-work is done by highly dedicated hardware, <inline-formula> <tex-math notation="LaTeX">$\textit {e.g.}$ </tex-math></inline-formula>, &#x201C;ASIC&#x201D;, which is not generally accessible, let alone the high energy consumption rates. In this work, we turn our eyes back to the original meaning of &#x201C;proof of work&#x201D;. Under a trusted setting, we propose a framework and its constructions based on computationally hard problems and the unified definition of hard cryptographic primitives by Biryukov and Perrin (Asiacrypt&#x2019; 17). The new framework enables us to have a proof-of-work scheme with time-hardness or memory-hardness while cutting down power consumption and reducing the impact of dedicated hardware.
ISSN:2169-3536