{"status":"public","publication_status":"published","day":"28","department":[{"_id":"VlKo"},{"_id":"KrPi"}],"date_updated":"2024-11-04T13:52:31Z","month":"11","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","related_material":{"record":[{"id":"1675","relation":"later_version","status":"public"}]},"publisher":"IST Austria","title":"Proofs of Space","date_created":"2018-12-11T11:56:42Z","oa":1,"has_accepted_license":"1","scopus_import":1,"language":[{"iso":"eng"}],"type":"report","_id":"2274","citation":{"apa":"Dziembowski, S., Faust, S., Kolmogorov, V., & Pietrzak, K. Z. (2013). Proofs of Space. IST Austria.","chicago":"Dziembowski, Stefan, Sebastian Faust, Vladimir Kolmogorov, and Krzysztof Z Pietrzak. Proofs of Space. IST Austria, 2013.","ista":"Dziembowski S, Faust S, Kolmogorov V, Pietrzak KZ. 2013. Proofs of Space, IST Austria,p.","ieee":"S. Dziembowski, S. Faust, V. Kolmogorov, and K. Z. Pietrzak, Proofs of Space. IST Austria, 2013.","ama":"Dziembowski S, Faust S, Kolmogorov V, Pietrzak KZ. Proofs of Space. IST Austria; 2013.","short":"S. Dziembowski, S. Faust, V. Kolmogorov, K.Z. Pietrzak, Proofs of Space, IST Austria, 2013.","mla":"Dziembowski, Stefan, et al. Proofs of Space. IST Austria, 2013."},"file_date_updated":"2020-07-14T12:45:36Z","publist_id":"4670","author":[{"first_name":"Stefan","last_name":"Dziembowski","full_name":"Dziembowski, Stefan"},{"last_name":"Faust","full_name":"Faust, Sebastian","first_name":"Sebastian"},{"id":"3D50B0BA-F248-11E8-B48F-1D18A9856A87","full_name":"Kolmogorov, Vladimir","last_name":"Kolmogorov","first_name":"Vladimir"},{"first_name":"Krzysztof Z","full_name":"Pietrzak, Krzysztof Z","last_name":"Pietrzak","id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0002-9139-1654"}],"abstract":[{"lang":"eng","text":"Proofs of work (PoW) have been suggested by Dwork and Naor (Crypto'92) as protection to a shared resource. The basic idea is to ask the service requestor to dedicate some non-trivial amount of computational work to every request. The original applications included prevention of spam and protection against denial of service attacks. More recently, PoWs have been used to prevent double spending in the Bitcoin digital currency system.\r\n\r\nIn this work, we put forward an alternative concept for PoWs -- so-called proofs of space (PoS), where a service requestor must dedicate a significant amount of disk space as opposed to computation. We construct secure PoS schemes in the random oracle model, using graphs with high "pebbling complexity" and Merkle hash-trees. "}],"date_published":"2013-11-28T00:00:00Z","file":[{"checksum":"37b61637b62fc079d9141c59d9f1a94f","file_name":"IST-2016-671-v1+1_796.pdf","content_type":"application/pdf","relation":"main_file","file_size":405870,"date_created":"2018-12-12T10:16:11Z","file_id":"5197","date_updated":"2020-07-14T12:45:36Z","creator":"system","access_level":"open_access"}],"oa_version":"Published Version","year":"2013","ddc":["530"],"pubrep_id":"671"}