Abstract
Proof of work (PoW), which was initially introduced for combating junk email spam, is extremely energy-thirsty, but the computed outcomes are of very little relevance to any practical usage. Some existing works tackle this issue by replacing the useless cryptographic puzzles with some pre-determined practical problems. However, the allowable problem types are usually limited and fixed, and some problems are of no significant value. This paper presents a Unified Proof of Work (UPoW) mechanism using flexible problems as puzzles, which features a computation-trading platform where delegators post their problems and PoW executors compute them as a by-product. The proposed UPoW puts known problem types together and frames them as verifiable computation problems using Fully Homomorphic Encryptions (FHE) techniques to replace PoW puzzles. It also secures and preserves the functionality of the delegated problems, which is showcased by delegating a Private Set Intersection (PSI) problem.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ball, M., Rosen, A., Sabin, M., Vasudevan, P.N.: Proofs of useful work. IACR Cryptol. ePrint Arch. 2017, 203 (2017)
Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139–147. Springer, Heidelberg (1993). https://doi.org/10.1007/3-540-48071-4_10
Fan, J., Vercauteren, F.: Somewhat practical fully homomorphic encryption. IACR Cryptol. ePrint Arch. 2012, 144 (2012)
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing, pp. 169–178 (2009)
Hu, H., Xu, J., Xu, X., Pei, K., Choi, B., Zhou, S.: Private search on key-value stores with hierarchical indexes. In: 2014 IEEE 30th International Conference on Data Engineering, pp. 628–639. IEEE (2014)
Nakamoto, S.: Re: Bitcoin P2P e-cash paper. The Cryptography Mailing List (2008)
On, S.T., Xu, J., Choi, B., Hu, H., He, B.: Flag commit: supporting efficient transaction recovery in flash-based DBMSs. IEEE Trans. Knowl. Data Eng. 24(9), 1624–1639 (2011)
Qu, X., Wang, S., Hu, Q., Cheng, X.: Proof of federated learning: a novel energy-recycling consensus algorithm. IEEE Trans. Parallel Distrib. Syst. 32(8), 2074–2085 (2021)
Shoker, A.: Sustainable blockchain through proof of exercise. In: 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA), pp. 1–9. IEEE (2017)
Acknowledgement
This work was supported by National Natural Science Foundation of China (Grant No: 62072390, 62102334), and the Research Grants Council, Hong Kong SAR, China (Grant No: 15222118, 15218919, 15203120, 15226221, 15225921, and C2004-21GF).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Fu, Y., Ye, Q., Du, R., Hu, H. (2023). Unified Proof of Work: Delegating and Solving Customized Computationally Bounded Problems in a Privacy-Preserving Way. In: Li, B., Yue, L., Tao, C., Han, X., Calvanese, D., Amagasa, T. (eds) Web and Big Data. APWeb-WAIM 2022. Lecture Notes in Computer Science, vol 13423. Springer, Cham. https://doi.org/10.1007/978-3-031-25201-3_24
Download citation
DOI: https://doi.org/10.1007/978-3-031-25201-3_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-25200-6
Online ISBN: 978-3-031-25201-3
eBook Packages: Computer ScienceComputer Science (R0)