2003
DOI: 10.1007/978-3-540-24597-1_37
|View full text |Cite
|
Sign up to set email alerts
|

Moderately Hard Functions: From Complexity to Spam Fighting

Abstract: Abstract.A key idea in cryptography is using hard functions in order to obtain secure schemes. The theory of hard functions (e.g. one-way functions) has been a great success story, and the community has developed a fairly strong understanding of what types of cryptographic primitives can be achieved under which assumption. We explore the idea of using moderately hard functions in order to achieve many tasks for which a perfect solution is impossible, for instance, denial-of-service. We survey some of the appli… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2007
2007
2021
2021

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 41 publications
0
4
0
Order By: Relevance
“…Similar to time-lock puzzles, VDFs are about ensuring a given bound on the computation delay is satisfied (and that parallelism is not effective in attacking the scheme) rather than the amount of computation. On the other hand, the notion of pricing functions [24,41], where the proof-of-work mining is an example of such functions, are similar in spirit to our work. The goal is to utilize moderately hard functions to put a price on some actions (e.g., sending spam emails) in terms of amount of computation.…”
Section: Related Workmentioning
confidence: 80%
“…Similar to time-lock puzzles, VDFs are about ensuring a given bound on the computation delay is satisfied (and that parallelism is not effective in attacking the scheme) rather than the amount of computation. On the other hand, the notion of pricing functions [24,41], where the proof-of-work mining is an example of such functions, are similar in spirit to our work. The goal is to utilize moderately hard functions to put a price on some actions (e.g., sending spam emails) in terms of amount of computation.…”
Section: Related Workmentioning
confidence: 80%
“…As pointed out by Naor [8], there is no rigorous treatment of moderately hard functions and only a small number of candidates have been proposed. In this paper, we try to address these issues.…”
Section: Our Contributionmentioning
confidence: 99%
“…This phenomenon is dubbed as "memory wall" [13]. It motivates cryptographers to design memory-bounded functions, which have found applications in complexity theory and computer security [8].…”
Section: Introductionmentioning
confidence: 99%
“…Timed commitments are one example of moderately hard functions [Nao03], which have recently been used for other kinds of secure multiparty computation. Pinkas [Pin03] uses timed commitments for twoparty computation, and Garay, MacKenzie and Yang [GMY04] use a different moderately hard function for general multiparty computation.…”
Section: Introductionmentioning
confidence: 99%