Skip to main content

Computational Puzzles

  • Reference work entry
Encyclopedia of Cryptography and Security
  • 398 Accesses

Synonyms

Client puzzles; Cryptographic puzzles; Proof of work

Definition

A computational puzzle is a moderately hard problem, the answer of which can be computed within a reasonable time and verified efficiently. Such a problem is often given to a service requester to solve before the requested service is provided, which mitigates the threats of denial of service (DoS) attacks and other service abuses such as spam.

Background

Cynthia Dwork and Moni Naor were the first to come up with the idea of using a moderately hard but tractable function to price the sender of junk mails [1]. The terms “client puzzle” and “cryptographic puzzle” were coined by Ari Juels and John Brainard to describe their protocol for countering connection depletion attacks [2]. Before them, Ronald Rivest, Adi Shamir, and David Wagner also discussed the concept of “time-lock” puzzles for controlling when encrypted data can be decrypted [3].

Theory

Computation puzzles are typically built upon “weakened” cryptographic...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Dwork C, Naor M (1992) Pricing via processing or combating junk mail. In Brickell E (ed) Proceedings of Advances in Cryptology—CRYPTO 92, Lecture Notes in Computer Science, 1328:139–147. Springer, Berlin

    Google Scholar 

  2. Juels A, Brainard J (1999) Client puzzle: a cryptographic defense against connection depletion attacks. In Kent S (ed) Proceedings of the 16th Annual Network and Distributed System Security Symposium, pp 151–165

    Google Scholar 

  3. Rivest R, Shamir A, Wagner D (1996) Time-lock puzzles and timed-release crypto. MIT/LCS/TR-684

    Google Scholar 

  4. Waters B, Juels A, Halderman JA, Felten EW (2004) New client puzzle outsourcing techniques for dos resistance. In Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 246–256. ACM Press, New York

    Google Scholar 

  5. Wang X, Reiter M (2003) Defending against denial-of-service attacks with puzzle auctions. In Proceedings of the IEEE Symposium on Security and Privacy, pp. 78–92. IEEE Press, New York

    Google Scholar 

  6. Wang X, Reiter M (2004) Mitigating bandwidth-exhaustion attacks using congestion puzzles. In Proceedings of the 11th ACM Conference on Computer and Communication Security, pp. 257–267. ACM Press, New York

    Google Scholar 

  7. Back A. HashCash. In: http://hashcash.org/

  8. Jakobsson M, Juels A (1999) Proofs of work and bread pudding protocols. In Communications and Multimedia Security, pp. 258–272. Kluwer Academic Publishers, Dordrecht, the Netherland

    Google Scholar 

  9. Gabber E, Jakobsson M, Matias Y, Mayer AJ (1998) Curbing junk e-mail via secure classification. In Proceedings of the Second International Conference on Financial Cryptography, Lecture Notes in Computer Science, 1465:198–213. Springer, Berlin

    Google Scholar 

  10. Aura T, Nikander P, Leiwo J (2000) Dos-resistant authentication with client puzzles. In Proceedings of the 8th International Workshop on Security Protocols, Lecture Notes in Computer Science, pp. 170–177. Springer, Berlin

    Google Scholar 

  11. Abadi M, Burrow M, Manasse M, Wobber T (2003) Moderately hard, memory-bound functions. In Proceedings of the 10th Annual Network and Distributed System Security Symposium, pp. 25–39. San Diego, California

    Google Scholar 

  12. Dwork C, Goldberg A, Naor M (2003) On memory-bound functions for fighting spam. In Proceedings of Advances in Cryptology - CRYPTO, Lecture Notes in Computer Science, 2729:426–444

    Google Scholar 

  13. Coelho F (2006) Exponential memory-bound functions for proof of work protocols. In Proceedings of Cryptology ePrint Archive, Report 2005/356

    Google Scholar 

  14. Feng W (2003) The case for TCP/IP puzzles. In SIGCOMM Comput Comm Rev 33(4):322–327. ACM Press, New York

    Article  Google Scholar 

  15. Feng W, Kaiser E, Luu A (2005) Design and implementation of network puzzles. In Proceedings of IEEE INFOCOM, pp. 2372–2382

    Google Scholar 

  16. Penny Black Project at Microsoft Research. In: http://research.microsoft.com/en-us/projects/pennyblack/

  17. Franklin M, Malkhi D (1997) Auditable metering with lightweight security. In Hirschfeld R (ed) Proceedings of Financial Cryptography 97 (FC 97), Lecture Notes in Computer Science 1318:151–160. Springer, Berlin

    Google Scholar 

  18. Goldschlag D, Stubblebine S (1998) Publically verifiable lotteries: applications of delaying functions (extend abstract). In Proceedings of Financial Cryptography 98, Lecture Notes in Computer Science 1465:214–226

    Article  Google Scholar 

  19. Syverson P (1998) Weakly secret bit commitment: Applications to lotteries and fair exchange. In CSFW ’98: Proceedings of the 11th IEEE Workshop on Computer Security Foundations, pp. 2–13

    Google Scholar 

  20. Garay J, Jakobsson M (2002) Timed release of standard digital signatures. In Proceedings of Financial Cryptography, emph Lecture Notes in Computer Science 2357:168–182. Springer, Berlin

    Google Scholar 

  21. Boneh D, Naor M (2000) Timed commitments (extended abstract). In Proceedings of Advances in Cryptology—CRYPTO’00, Lecture Notes in Computer Science 1880:236–254. Springer, Berlin

    Google Scholar 

  22. Laurie B, Clayton R (2004) Proof of work proves not to work. In Proceedings of Workshop on the Economics of Information Security

    Google Scholar 

  23. Liu D, Camp LJ (2006) Proof of work can work. In Proceedings of Workshop on the Economics of Information Security

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Wang, X. (2011). Computational Puzzles. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_264

Download citation

Publish with us

Policies and ethics