Proof of work without all the work

D Gupta, J Saia, M Young - … of the 19th international conference on …, 2018 - dl.acm.org
Proof-of-work (PoW) is an algorithmic tool used to secure networks by imposing a
computational cost on participating devices. Unfortunately, traditional PoW schemes require …

Bankrupting DoS attackers

T Chakraborty, A Islam, V King, D Rayborn… - arxiv preprint arxiv …, 2022 - arxiv.org
To defend against denial-of-service (DoS) attacks, we employ a technique called resource
burning (RB). RB is the verifiable expenditure of a resource, such as computational power …

Distributed computations in fully-defective networks

K Censor-Hillel, S Cohen, R Gelles… - Proceedings of the 2022 …, 2022 - dl.acm.org
We address fully-defective asynchronous networks, in which all links are subject to an
unlimited number of alteration errors, implying that all messages in the network may be …

Scalable and secure computation among strangers: Message-competitive byzantine protocols

J Augustine, V King, AR Molla… - 34th International …, 2020 - drops.dagstuhl.de
The last decade has seen substantial progress on designing Byzantine agreement
algorithms which do not require all-to-all communication. However, these protocols do …

Interactive coding resilient to an unknown number of erasures

R Gelles, S Iyer - arxiv preprint arxiv:1811.02527, 2018 - arxiv.org
We consider distributed computations between two parties carried out over a noisy channel
that may erase messages. Following a noise model proposed by Dani et al.(2018), the noise …

Bankrupting Sybil despite churn

D Gupta, J Saia, M Young - Journal of Computer and System Sciences, 2023 - Elsevier
A Sybil attack occurs when an adversary controls multiple system identifiers (IDs). Limiting
the number of Sybil (bad) IDs to a minority is critical for tolerating malicious behavior. A …

[KSIĄŻKA][B] Resource sharing in secure distributed systems

T Chakraborty - 2024 - search.proquest.com
Allocating resources in computer systems is a significant challenge due to constraints on
resources, coordinating access to those resources, and tolerating malicious behavior. This …

Scalable and secure computation among strangers: Resource-competitive Byzantine protocols

J Augustine, V King, AR Molla, G Pandurangan… - arxiv preprint arxiv …, 2019 - arxiv.org
Motivated, in part, by the rise of permissionless systems such as Bitcoin where arbitrary
nodes (whose identities are not known apriori) can join and leave at will, we extend …

Sybil defense using efficient resource burning

D Gupta - 2020 - search.proquest.com
Abstract In 1993, Dwork and Naor proposed using computational puzzles, a resource
burning mechanism, to combat spam email. In the ensuing three decades, resource burning …

Thwarting Adversaries with Randomness and Irrationality

A Aggarwal - 2019 - search.proquest.com
Distributed systems are ubiquitous today: from the Internet used by billions of people around
the world to the small scale IoT devices. With this rapidly increasing need to perform …