Asymmetric proof-of-work based on the Generalized Birthday problem

نویسندگان

  • Alex Biryukov
  • Dmitry Khovratovich
چکیده

The proof-of-work is a central concept in modern cryptocurrencies, but the requirement for fast verification so far made it an easy prey for GPU-, ASIC-, and botnet-equipped users. The attempts to rely on memory-intensive computations in order to remedy the disparity between architectures have resulted in slow or broken schemes. In this paper we solve this open problem and show how to construct an asymmetric proof-of-work (PoW) based on a computationally hard problem, which requires a lot of memory to generate a proof (called ”memory-hardness” feature) but is instant to verify. Our primary proposal is a PoW based on the generalized birthday problem and enhanced Wagner’s algorithm for it. We introduce the new technique of algorithm binding to prevent cost amortization and demonstrate that possible parallel implementations are constrained by memory bandwidth. Our scheme has tunable and steep time-space tradeoffs, which impose large computational penalties if less memory is used. Our solution is practical and ready to deploy: a reference implementation of a proof-of-work requiring 700 MB of RAM runs in 30 seconds on a 1.8 GHz CPU, increases the computations by the factor of 1000 if memory is halved, and presents a proof of just 148 bytes long.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem: Open Review

The final version of the paper “Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem” can be found in Ledger Vol. 2 (2017) 1-30, DOI 10.5915/LEDGER.2017.48. There were two reviewers who responded, neither of whom have requested to waive their anonymity at present, and are thus listed as A and B. After initial review (1A), the author submitted a revised submission and res...

متن کامل

Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem

The proof-of-work is a central concept in modern cryptocurrencies and denial-of-service protection tools, but the requirement for fast verification so far made it an easy prey for GPU-, ASIC-, and botnet-equipped users. The attempts to rely on memory-intensive computations in order to remedy the disparity between architectures have resulted in slow or broken schemes. In this paper we solve this...

متن کامل

A New Proof of FDR Control Based on Forward Filtration

For multiple testing problems, Benjamini and Hochberg (1995) proposed the false discovery rate (FDR) as an alternative to the family-wise error rate (FWER). Since then, researchers have provided many proofs to control the FDR under different assumptions. Storey et al. (2004) showed that the rejection threshold of a BH step-up procedure is a stopping time with respect to the reverse filtration g...

متن کامل

Refinements of the k-tree Algorithm for the Generalized Birthday Problem

We study two open problems proposed by Wagner in his seminal work on the generalized birthday problem. First, with the use of multicollisions, we improve Wagner’s 3-tree algorithm. The new 3-tree only slightly outperforms Wagner’s 3-tree, however, in some applications this suffices, and as a proof of concept, we apply the new algorithm to slightly reduce the security of two CAESAR proposals. Ne...

متن کامل

Higher moments portfolio Optimization with unequal weights based on Generalized Capital Asset pricing model with independent and identically asymmetric Power Distribution

The main criterion in investment decisions is to maximize the investors utility. Traditional capital asset pricing models cannot be used when asset returns do not follow a normal distribution. For this reason, we use capital asset pricing model with independent and identically asymmetric power distributed (CAPM-IIAPD) and capital asset pricing model with asymmetric independent and identically a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2015  شماره 

صفحات  -

تاریخ انتشار 2015