Proof of work without all the work

D Gupta, J Saia, M Young - … of the 19th international conference on …, 2018 - dl.acm.org
Proof-of-work (PoW) is an algorithmic tool used to secure networks by imposing a
computational cost on participating devices. Unfortunately, traditional PoW schemes require …

The optimal error resilience of interactive communication over binary channels

M Gupta, RY Zhang - Proceedings of the 54th Annual ACM SIGACT …, 2022 - dl.acm.org
In interactive coding, Alice and Bob wish to compute some function f of their individual
private inputs x and y. They do this by engaging in a non-adaptive (fixed order, fixed length) …

Efficient interactive coding achieving optimal error resilience over the binary channel

M Gupta, RY Zhang - Proceedings of the 55th Annual ACM Symposium …, 2023 - dl.acm.org
Given a noiseless protocol π0 computing a function f (x, y) of Alice and Bob's private inputs
x, y, the goal of interactive coding is to construct an error-resilient protocol π computing f …

Distributed computations in fully-defective networks

K Censor-Hillel, S Cohen, R Gelles… - Proceedings of the 2022 …, 2022 - dl.acm.org
We address fully-defective asynchronous networks, in which all links are subject to an
unlimited number of alteration errors, implying that all messages in the network may be …

Resource-competitive algorithms

MA Bender, JT Fineman, M Movahedi, J Saia… - ACM SIGACT …, 2015 - dl.acm.org
The point of adversarial analysis is to model the worst-case performance of an algorithm.
Unfortunately, this analysis may not always reect performance in practice because the …

Bankrupting DoS Attackers Despite Uncertainty

T Chakraborty, A Islam, V King, D Rayborn… - arXiv preprint arXiv …, 2022 - arxiv.org
On-demand provisioning in the cloud allows for services to remain available despite
massive denial-of-service (DoS) attacks. Unfortunately, on-demand provisioning is …

Scalable and secure computation among strangers: Message-competitive byzantine protocols

J Augustine, V King, AR Molla… - 34th International …, 2020 - drops.dagstuhl.de
The last decade has seen substantial progress on designing Byzantine agreement
algorithms which do not require all-to-all communication. However, these protocols do …

Bankrupting Sybil despite churn

D Gupta, J Saia, M Young - Journal of Computer and System Sciences, 2023 - Elsevier
A Sybil attack occurs when an adversary controls multiple system identifiers (IDs). Limiting
the number of Sybil (bad) IDs to a minority is critical for tolerating malicious behavior. A …

A resource-competitive jamming defense

V King, S Pettie, J Saia, M Young - Distributed Computing, 2018 - Springer
Consider a scenario where Alice wishes to send a message m to Bob in a time-slotted
wireless network. However, there exists an adversary, Carol, who aims to prevent the …

Interactive coding resilient to an unknown number of erasures

R Gelles, S Iyer - arXiv preprint arXiv:1811.02527, 2018 - arxiv.org
We consider distributed computations between two parties carried out over a noisy channel
that may erase messages. Following a noise model proposed by Dani et al.(2018), the noise …