Proof of work without all the work
Proof-of-work (PoW) is an algorithmic tool used to secure networks by imposing a
computational cost on participating devices. Unfortunately, traditional PoW schemes require …
computational cost on participating devices. Unfortunately, traditional PoW schemes require …
The optimal error resilience of interactive communication over binary channels
M Gupta, RY Zhang - Proceedings of the 54th Annual ACM SIGACT …, 2022 - dl.acm.org
In interactive coding, Alice and Bob wish to compute some function f of their individual
private inputs x and y. They do this by engaging in a non-adaptive (fixed order, fixed length) …
private inputs x and y. They do this by engaging in a non-adaptive (fixed order, fixed length) …
Efficient interactive coding achieving optimal error resilience over the binary channel
M Gupta, RY Zhang - Proceedings of the 55th Annual ACM Symposium …, 2023 - dl.acm.org
Given a noiseless protocol π0 computing a function f (x, y) of Alice and Bob's private inputs
x, y, the goal of interactive coding is to construct an error-resilient protocol π computing f …
x, y, the goal of interactive coding is to construct an error-resilient protocol π computing f …
Distributed computations in fully-defective networks
We address fully-defective asynchronous networks, in which all links are subject to an
unlimited number of alteration errors, implying that all messages in the network may be …
unlimited number of alteration errors, implying that all messages in the network may be …
Resource-competitive algorithms
The point of adversarial analysis is to model the worst-case performance of an algorithm.
Unfortunately, this analysis may not always reect performance in practice because the …
Unfortunately, this analysis may not always reect performance in practice because the …
Bankrupting DoS Attackers Despite Uncertainty
On-demand provisioning in the cloud allows for services to remain available despite
massive denial-of-service (DoS) attacks. Unfortunately, on-demand provisioning is …
massive denial-of-service (DoS) attacks. Unfortunately, on-demand provisioning is …
Scalable and secure computation among strangers: Message-competitive byzantine protocols
The last decade has seen substantial progress on designing Byzantine agreement
algorithms which do not require all-to-all communication. However, these protocols do …
algorithms which do not require all-to-all communication. However, these protocols do …
Bankrupting Sybil despite churn
A Sybil attack occurs when an adversary controls multiple system identifiers (IDs). Limiting
the number of Sybil (bad) IDs to a minority is critical for tolerating malicious behavior. A …
the number of Sybil (bad) IDs to a minority is critical for tolerating malicious behavior. A …
A resource-competitive jamming defense
Consider a scenario where Alice wishes to send a message m to Bob in a time-slotted
wireless network. However, there exists an adversary, Carol, who aims to prevent the …
wireless network. However, there exists an adversary, Carol, who aims to prevent the …
Interactive coding resilient to an unknown number of erasures
We consider distributed computations between two parties carried out over a noisy channel
that may erase messages. Following a noise model proposed by Dani et al.(2018), the noise …
that may erase messages. Following a noise model proposed by Dani et al.(2018), the noise …