Proofs of space: when space is of the essence

Giuseppe Ateniese, Ilario Bonacina, Antonio Faonio, Nicola Galesi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

79 Scopus citations

Abstract

Proofs of computational effort were devised to control denial of service attacks. Dwork and Naor (CRYPTO’92), for example, proposed to use such proofs to discourage spam. The idea is to couple each email message with a proof of work that demonstrates the sender performed some computational task. A proof of work can be either CPUbound or memory-bound. In a CPU-bound proof, the prover must compute a CPU-intensive function that is easy to check by the verifier. A memory-bound proof, instead, forces the prover to access the main memory several times, effectively replacing CPU cycles with memory accesses. In this paper we put forward a new concept dubbed proof of space. To compute such a proof, the prover must use a specified amount of space, i.e., we are not interested in the number of accesses to the main memory (as in memory-bound proof of work) but rather on the amount of actual memory the prover must employ to compute the proof. We give a complete and detailed algorithmic description of our model. We develop a full theoretical analysis which uses combinatorial tools from Complexity Theory (such as pebbling games) which are essential in studying space lower bounds.

Original languageEnglish
Title of host publicationSecurity and Cryptography for Networks - 9th International Conference, SCN 2014, Proceedings
EditorsMichel Abdalla, Roberto de Prisco
Pages538-557
Number of pages20
ISBN (Electronic)9783319108780
DOIs
StatePublished - 2014
Event9th International Conference on Security and Cryptography for Networks, SCN 2014 - Amalfi, Italy
Duration: 3 Sep 20145 Sep 2014

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8642
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference9th International Conference on Security and Cryptography for Networks, SCN 2014
Country/TerritoryItaly
CityAmalfi
Period3/09/145/09/14

Keywords

  • Pebbling Game
  • Proof of Work
  • Random Oracle Model
  • Space Complexity

Fingerprint

Dive into the research topics of 'Proofs of space: when space is of the essence'. Together they form a unique fingerprint.

Cite this