Resource burning for permissionless systems
Proof-of-work puzzles and CAPTCHAS consume enormous amounts of energy and time.
These techniques are examples of resource burning: verifiable consumption of resources …
These techniques are examples of resource burning: verifiable consumption of resources …
ETHTID: Deployable threshold information disclosure on Ethereum
O Stengele, M Raiber, J Müller-Quade… - 2021 Third …, 2021 - ieeexplore.ieee.org
We address the Threshold Information Disclosure (TID) problem on Ethereum: An arbitrary
number of users commit to the scheduled disclosure of their individual messages recorded …
number of users commit to the scheduled disclosure of their individual messages recorded …
Sybil defense using efficient resource burning
D Gupta - 2020 - search.proquest.com
Abstract In 1993, Dwork and Naor proposed using computational puzzles, a resource
burning mechanism, to combat spam email. In the ensuing three decades, resource burning …
burning mechanism, to combat spam email. In the ensuing three decades, resource burning …