Proofs of Space
Offered By: TheIACR via YouTube
Course Description
Overview
Syllabus
Intro
General idea
Proofs of Work - a tool for dealing with the Sybil attacks
How are the Pows used?
How to measure computational difficulty?
A drawback of PoW systems
What to do?
Example of an application
Main difference from Pows
Advantages
How to measure time and space
The proof is done with respect to an identifier Id
How to define security of a Pos
How to define the efficiency?
How to define soundness?
What would be the goal of a cheating prover?
Observation: a cheating prover has a simple (but inefficient) winning strategy.
Restrictions on cheating prover
Security definition
Why is constructing the Pos schemes non-trivial?
Our main technique
Very informally
How to build a Pos from a good graph?
Our solution: let the prover commit to R with a Merkle tree.
The Proof phase
Our results
Spacecoin
Previous/related/independent work
Taught by
TheIACR
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera