Projects per year
Abstract
Cryptographic algorithms have been used not only to create robust ciphertexts but also to generate cryptograms that, contrary to the classic goal of cryptography, are meant to be broken. These cryptograms, generally called puzzles, require the use of a certain amount of resources to be solved, hence introducing a cost that is often regarded as a time delay—though it could involve other metrics as well, such as bandwidth. These powerful features have made puzzles the core of many security protocols, acquiring increasing importance in the IT security landscape. The concept of a puzzle has subsequently been extended to other types of schemes that do not use cryptographic functions, such as CAPTCHAs, which are used to discriminate humans from machines. Overall, puzzles have experienced a renewed interest with the advent of Bitcoin, which uses a CPU-intensive puzzle as proof of work. In this article, we provide a comprehensive study of the most important puzzle construction schemes available in the literature, categorizing them according to several attributes, such as resource type, verification type, and applications. We have redefined the term puzzle by collecting and integrating the scattered notions used in different works, to cover all the existing applications. Moreover, we provide an overview of the possible applications, identifying key requirements and different design approaches. Finally, we highlight the features and limitations of each approach, providing a useful guide for the future development of new puzzle schemes.
| Original language | English |
|---|---|
| Article number | 3396374 |
| Pages (from-to) | 1-38 |
| Journal | ACM Computing Surveys |
| Volume | 53 |
| Issue number | 4 |
| DOIs | |
| Publication status | Published - 20 Aug 2020 |
Keywords
- Bandwidth-bound puzzle
- Bitcoin
- CAPTCHA
- CPU-bound puzzle
- Cryptocurrency
- Cryptographic puzzle
- Human-bound puzzle
- Memory-bound puzzle
- Network-bound puzzle
- Proof-of-Work
Fingerprint
Dive into the research topics of 'Foundations, Properties, and Security Applications of Puzzles: A Survey: A Survey'. Together they form a unique fingerprint.Projects
- 1 Finished
-
EX-QNRF-NPRPS-56: Extending Blockchain Technology - a Novel Paradigm and its Applications to Cybersecurity and Fintech
Yang, D. (Lead Principal Investigator), Student-1, G. (Graduate Student), Student-4, G. (Graduate Student), lombardi, D. F. (Principal Investigator), El-Sallabi, D. H. (Principal Investigator), Jain, D. R. (Principal Investigator) & Aldoseri, M. A. (Principal Investigator)
12/05/19 → 22/08/23
Project: Applied Research