2010
DOI: 10.1007/978-3-642-15497-3_41
|View full text |Cite
|
Sign up to set email alerts
|

Low-Cost Client Puzzles Based on Modular Exponentiation

Abstract: Abstract. Client puzzles have been proposed as a useful mechanism for mitigating Denial of Service attacks on network protocols. While several puzzles have been proposed in recent years, most existing nonparallelizable puzzles are based on modular exponentiations. The main drawback of these puzzles is in the high cost that they incur on the puzzle generator (the verifier). In this paper, we propose cryptographic puzzles based on modular exponentiation that reduce this overhead. Our constructions are based on a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(32 citation statements)
references
References 34 publications
0
32
0
Order By: Relevance
“…Recently, Karame andČapkun [12] improved the verification efficiency of Rivest et al's puzzle by a factor of |n| 2k for a given RSA modulus n, where k is the security parameter. More details on these two puzzles will be provided in Section 2.…”
Section: Puzzle Propertiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, Karame andČapkun [12] improved the verification efficiency of Rivest et al's puzzle by a factor of |n| 2k for a given RSA modulus n, where k is the security parameter. More details on these two puzzles will be provided in Section 2.…”
Section: Puzzle Propertiesmentioning
confidence: 99%
“…3. In order to validate the performance of our puzzle, we give experimental results and compare them with the performances of Rivest et al's time-lock puzzle [18] and Karame andČapkun's puzzle [12], which is the most efficient non-parallelisable puzzle in the literature. Our results suggest that our puzzle reduces the solution verification time by approximately 99 times when compared to Rivest et al's time-lock puzzle and 30 times when compared to Karame andČapkun, for 1024-bit moduli.…”
Section: Contributionsmentioning
confidence: 99%
“…Consider two representative proof of work puzzles from the literature (and recall c is the commitment value and d is a difficulty parameter). The first puzzle (P rs ), based on repeated squaring, is to compute Solve(d, c, N ) = c [29,6,21]. The second puzzle (P h ), based on hash preimages, is to find an x such that y = H(c, x) has d leading zeros (where H is a cryptographic hash function)…”
Section: Puzzle Propertiesmentioning
confidence: 99%
“…In mutual proofs of work, two parties prove to each other that they have computed some asserted amount of computational effort. This task is inspired by, and similar to, client puzzles [18,19,24,25,33] and puzzle auctions [35]. We give a protocol for mutual proofs of work whose computational task is computing hash chains.…”
Section: The Second Iterate Paradoxmentioning
confidence: 99%
“…We suggest that just such a setting could arise in protocols in which parties want to assert to each other, in a verifiable way, that they performed some amount of computation. Such a setting could arise when parties must (provably) compare assertions of computational power, as when using cryptographic puzzles [18,19,24,25,33,35]. Or this might work when trying to verifiably calibrate differing computational speeds of the two parties' computers.…”
Section: A Vulnerable Application: Mutual Proofs Of Workmentioning
confidence: 99%