A survey on consensus mechanisms and mining strategy management in blockchain networks

W Wang, DT Hoang, P Hu, Z Xiong, D Niyato… - Ieee …, 2019 - ieeexplore.ieee.org
The past decade has witnessed the rapid evolution in blockchain technologies, which has
attracted tremendous interests from both the research communities and industries. The …

Foundations, properties, and security applications of puzzles: A survey

IM Ali, M Caprolu, RD Pietro - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Cryptographic algorithms have been used not only to create robust ciphertexts but also to
generate cryptograms that, contrary to the classic goal of cryptography, are meant to be …

SPARKs: succinct parallelizable arguments of knowledge

N Ephraim, C Freitag, I Komargodski… - … Conference on the Theory …, 2020 - Springer
We introduce the notion of a Succinct Parallelizable Argument of Knowledge (SPARK). This
is an argument system with the following three properties for computing and proving a time T …

Sustained space complexity

J Alwen, J Blocki, K Pietrzak - … International Conference on the Theory and …, 2018 - Springer
Memory-hard functions (MHF) are functions whose evaluation cost is dominated by memory
cost. MHFs are egalitarian, in the sense that evaluating them on dedicated hardware (like …

Data-independent memory hard functions: New attacks and stronger constructions

J Blocki, B Harsha, S Kang, S Lee, L Xing… - Annual International …, 2019 - Springer
Memory-hard functions (MHFs) are a key cryptographic primitive underlying the design of
moderately expensive password hashing algorithms and egalitarian proofs of work. Over the …

Relaxed locally correctable codes in computationally bounded channels

J Blocki, V Gandikota, E Grigorescu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Error-correcting codes that admit local decoding and correcting algorithms have been the
focus of much recent research due to their numerous applications. An important goal is to …

Memory-hard functions from cryptographic primitives

B Chen, S Tessaro - Advances in Cryptology–CRYPTO 2019: 39th Annual …, 2019 - Springer
Memory-hard functions (MHFs) are moderately-hard functions which enforce evaluation
costs both in terms of time and memory (often, in form of a trade-off). They are used eg for …

Consensus from signatures of work

JA Garay, A Kiayias, G Panagiotakos - Topics in Cryptology–CT-RSA 2020 …, 2020 - Springer
Assuming the existence of a public-key infrastructure (PKI), digital signatures are a
fundamental building block in the design of secure consensus protocols with optimal …

On the computational complexity of minimal cumulative cost graph pebbling

J Blocki, S Zhou - … Conference on Financial Cryptography and Data …, 2018 - Springer
We consider the computational complexity of finding a legal black pebbling of a DAG G=(V,
E) with minimum cumulative cost. A black pebbling is a sequence P_0, ..., P_t ⊆ V of sets of …

Static-memory-hard functions, and modeling the cost of space vs. time

T Dryja, QC Liu, S Park - … 16th International Conference, TCC 2018, Panaji …, 2018 - Springer
A series of recent research starting with (Alwen and Serbinenko, STOC 2015) has deepened
our understanding of the notion of memory-hardness in cryptography—a useful property of …