Cryptographic primitives enforcing communication and storage complexity

60Citations
Citations of this article
42Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We introduce a new type of cryptographic primitives which enforce high communication or storage complexity. To evaluate these primitives on a random input, one has to engage in a protocol of high communication complexity, or one has to use a lot of storage. Therefore, the ability to compute these primitives constitutes a certain "proof of work," since the computing party is forced to contribute a lot of its communication or storage resources to this task. Such primitives can be used in applications which deal with non-malicious but selfishly resource-maximizing parties. For example, they can be useful in constructing peer-to-peer systems which are robust against so called "free riders." In this paper we define two such primitives, a communication-enforcing signature and a storage-enforcing commitment scheme, and we give constructions for both.

Cite

CITATION STYLE

APA

Golle, P., Jarecki, S., & Mironov, I. (2003). Cryptographic primitives enforcing communication and storage complexity. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2357, pp. 120–135). Springer Verlag. https://doi.org/10.1007/3-540-36504-4_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free