Getting started
IntroductionDefinitionsIdeas and TheoryUse CaseConstructions
Filecoin PoS Related ProtocolsOpen ProblemsUseful resources
DocumentationOutreach TalksReferences
Proof of Space and Replication
- Proofs of Space with Maximal Hardness Leonid Reyzin URL: https://eprint.iacr.org/2023/1530
- stoRNA: Stateless Transparent Proofs of Storage-time. Reyhaneh Rabaninejad, Behzad Abdolmaleki, Giulio Malavolta, Antonis Michalas, Amir Nabizadeh URL: https://eprint.iacr.org/2023/515
- Proof of storage-time: Efficiently checking continuous data availability. Ateniese, G., Chen, L., Etemad, M., Tang, Q. In: NDSS (2020) URL: https://eprint.iacr.org/2020/840
- Proofs of Catalytic Space Krzysztof Pietrzak URL: https://eprint.iacr.org/2018/194.pdf
- Proofs of Replicated Storage Without Timing Assumptions. Ivan Damgård, Chaya Ganesh, Claudio Orlandi In: Advances in Cryptology – CRYPTO 2019 URL: https://eprint.iacr.org/2018/654.pdf
- Spacemint: A cryptocurrency based on proofs of space. S. Park, A. Kwon, G. Fuchbauer, P. Gazi, J. Alwen, and K. Pietrzak In Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC). Springer, 2018. URL: http://fc18.ifca.ai/preproceedings/78.pdf.
- Poreps: Proofs of space on useful data. B. Fisch. IACR Cryptology ePrint Archive, 2018:678, 2018. URL: https://eprint.iacr.org/2018/678.
- Tight proofs of space and replication. B. Fisch. IACR Cryptology ePrint Archive, Report 2018/702, 2018. URL: https://eprint.iacr.org/2018/702.
- Filecoin: A decentralized storage network. Protocol Labs 2017 URL: https://filecoin.io/filecoin.pdf
- Beyond Hellman’s time-memory trade-offs with applications to proofs of space. H. Abusalah, J. Alwen, B. Cohen, D. Khilko, K. Pietrzak, and L. Reyzin In Advances in Cryptology ASIACRYPT 2017 Proceedings, 2017. URL: https://eprint.iacr.org/2017/893.pdf
- Proof of Space from Stacked Expanders. Ling Ren, Srinivas Devadas In Advances in Cryptology TCC 2016 URL: https://eprint.iacr.org/2016/333.pdf
- On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model. J. Alwen, B. Chen, C. Kamath, V. Kolmogorov, K. Pietrzak, S. Tessaro In Advances in Cryptology EUROCRYPT 2016 URL: https://eprint.iacr.org/2016/100.pdf
- Proofs of space. S. Dziembowski, S. Faust, V. Kolmogorov, and K. Pietrzak. In Advances in Cryptology CRYPTO 2015 Proceedings, 2015. URL: https://www.iacr.org/archive/crypto2015/92160192/92160192.pdf
- Proofs of Space: When Space is of the Essence. Giuseppe Ateniese, Ilario Bonacina, Antonio Faonio, and Nicola Galesi. In Security and Cryptography for Networks SCN 2014. URL: https://eprint.iacr.org/2013/805
- Provable data possession at untrusted stores. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song. In: Proceedings of the 14th ACM CCS 2007 URL: https://eprint.iacr.org/2007/202.pdf
Proof of Retrievability
- Mirror: Enabling proofs of data replication and retrievability in the cloud. F. Armknecht, L. Barman, J-M. Bohli, and G. O. Karame In USENIX Security Symposium, pages 1051–1068, 2016 URL: https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_armknecht.pdf
- Dynamic proofs of retrievability via oblivious RAM. David Cash, Alptekin Küpçü, and Daniel Wichs Journal of Cryptology, pages 1–26, 2015. URL: https://eprint.iacr.org/2012/550.pdf
- Proofs of retrievability via hardness amplification. Yevgeniy Dodis, Salil P. Vadhan, and Daniel Wichs In TCC 2009, volume 5444 of LNCS, March 2009. URL: https://eprint.iacr.org/2009/041.pdf
- Compact proofs of retrievability. Hovav Shacham and Brent Waters In ASIACRYPT 2008, volume 5350 of LNCS. Springer, 2008. URL: https://eprint.iacr.org/2008/073.pdf
- Pors: proofs of retrievability for large files. Ari Juels and Burton S. Kaliski Jr In ACM CCS 2007, pages 584–597. ACM Press, October 2007 URL: https://eprint.iacr.org/2007/243
- Provable data possession at untrusted stores. G. Ateniese, R. C. Burns, R. Curtmola, J. Herring, L. Kissner, Z. N. J. Peterson, D. X. Song In ACM CCS 2007 URL: https://eprint.iacr.org/2007/202.pdf
Proof of Data Possession
- Scalable and efficient provable data possession. G. Ateniese, R. Di Pietro, L.V. Mancini, and G. Tsudik In SecureComm ACM 2008, pp. 1–10. URL: https://eprint.iacr.org/2008/114.pdf
- Provable data possession at untrusted stores. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song. In: Proceedings of the 14th ACM CCS (2007) URL: https://eprint.iacr.org/2007/202.pdf
Proof of Secure Erasure
- Efficient Proofs of Secure Erasure. Nikolaos P. Karvelas, Aggelos Kiayias In SCN 2014
- One-Time Computable Self-erasing Functions. Stefan Dziembowski, Tomasz Kazana, Daniel Wichs: In TCC 2011
- Secure code update for embedded devices via proofs of secure erasure. Daniele Perito and Gene Tsudik. In ESORICS 2010, volume 6345 of LNCS, pages 643–662. Springer, 2010 URL: https://eprint.iacr.org/2010/217.pdf
Memory-Hard Functions
- Efficiently Computing Data-Independent Memory-Hard Functions. Joël Alwen, Jeremiah Blocki In CRYPTO 2016
- High Parallel Complexity Graphs and Memory-Hard Functions. Joël Alwen, Vladimir Serbinenko In STOC 2015
- Tradeoff Cryptanalysis of Memory-Hard Functions. Alex Biryukov, Dmitry Khovratovich In ASIACRYPT 2015
- Moderately hard, memory-bound functions. Martin Abadi, Michael Burrows, Mark S. Manasse, Ted Wobber In ACM Trans. Internet Techn (2005)
Time-Space Trade-offs
- Asymptotically tight bounds on time-space trade-offs in a pebble game. Thomas Lengauer, Robert Endre Tarjan In J. ACM 29 (1982)
- Time-Space Trade-Offs in a Pebble Game. Wolfgang J. Paul, Robert Endre Tarjan In Acta Informatica 10 (1978)
- On Time versus Space and Related Problems. John E. Hopcroft, Wolfgang J. Paul, Leslie G. Valiant In FOCS 1975
- An Observation on Time-Storage Trade Off. Stephen A. Cook In STOC 1973
Depth Robust Graphs
- Lower Bounds and Trade-offs in Proof Complexity Susanna de Rezende, PhD thesis URL: manuscript
- Depth-robust graphs and their cumulative memory complexity J. Alwen, J. Blocki, and K.Pietrzak, In EUROCRYPT 2017 URL: https://eprint.iacr.org/2016/875.pdf
- On depth-reduction and grates G. Schnitger, In 24th Annual Symposium on Foundations of Computer Science (sfcs 1983) URL: https://ieeexplore.ieee.org/document/4568095
- Asymptotically tight bounds on time-space trade-offs in a pebble game Thomas Lengauer and Robert E. Tarjan, In STOC 1979 URL: https://dl.acm.org/doi/pdf/10.1145/322344.322354
- Graph-theoretic arguments in low-level complexity Leslie G. Valiant In MFCS 1977 URL: PDF
← Previous
Next →