Combating spam and denial-of-service attacks with trusted puzzle solvers

2Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cryptographic puzzles can be used to mitigate spam and denial-of-service (DoS) attacks, as well as to implement timed-release cryptography. However, existing crypto puzzles are impractical because: (1) solving them wastes computing resources and/or human time, (2) the time it takes to solve them can vary dramatically across computing platforms, and/or (3) applications become non-interoperable due to competition for resources when solving them. We propose the use of Trusted Computing in constructing crypto puzzles. Our puzzle constructions have none of the drawbacks above and only require each client machine to be equipped with a small tamper-resistant Trusted Puzzle Solver (TPS), which may be realized using the prevalent Trusted Platform Module (TPM) with minimal modifications. © 2008 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Tsang, P. P., & Smith, S. W. (2008). Combating spam and denial-of-service attacks with trusted puzzle solvers. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4991 LNCS, pp. 188–202). https://doi.org/10.1007/978-3-540-79104-1_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free