Proofs of Work - a tool for dealing with the Sybil attacks
4
How are the Pows used?
5
How to measure computational difficulty?
6
A drawback of PoW systems
7
What to do?
8
Example of an application
9
Main difference from Pows
10
Advantages
11
How to measure time and space
12
The proof is done with respect to an identifier Id
13
How to define security of a Pos
14
How to define the efficiency?
15
How to define soundness?
16
What would be the goal of a cheating prover?
17
Observation: a cheating prover has a simple (but inefficient) winning strategy.
18
Restrictions on cheating prover
19
Security definition
20
Why is constructing the Pos schemes non-trivial?
21
Our main technique
22
Very informally
23
How to build a Pos from a good graph?
24
Our solution: let the prover commit to R with a Merkle tree.
25
The Proof phase
26
Our results
27
Spacecoin
28
Previous/related/independent work
Description:
Explore the concept of Proofs of Space in this 24-minute conference talk. Delve into the general idea behind this alternative to Proofs of Work, understanding its application in dealing with Sybil attacks. Examine how to measure computational difficulty and space usage, and learn about the advantages of Proofs of Space systems. Investigate the security definitions, efficiency metrics, and potential cheating strategies. Discover the main techniques used in constructing Proofs of Space schemes, including the use of Merkle trees for commitment. Gain insights into the proof phase and the results of implementing this concept. Finally, explore the application of Proofs of Space in Spacecoin and review related work in the field.