Session:Cryptography of Killing Proof-of-Work

Revision as of 18:48, 21 August 2019 by Soc (talk | contribs) (Created page with "{{Session |Is for kids=No |Has description=We briefly discuss the range of cryptographic primitives being used by protocols that seek to make proof-of-work protocols obsolete....")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Description We briefly discuss the range of cryptographic primitives being used by protocols that seek to make proof-of-work protocols obsolete. We shall focus primarily on these cryptographic building blocks themselves, not overly on the different protocols built form them.
Website(s) https://talx.thm.cloud/thms/talk/Z3VR8P/
Type Talk
Kids session No
Keyword(s) software, security
Processing village Village:Three Headed Monkey
Person organizing
Language en - English
en - English
Other sessions... ... further results

Subtitle Location: Planke (Bühne)
Starts at 2019/08/23, 17:00
Ends at 2019/08/23 17:30
Duration 30 minutes
Location Village:Three Headed Monkey


There are a handful of protocols consuming enormous amounts of energy in proof-of-work schemes, which provide only rather tenuous security assurances. In practice, proof-of-work also invalidates these protocols original goal of being distributed.

There is also a zoo of protocols designs, both new and from the 80s, that provide far stronger security than proof-of-work at minimal cost. We shall discuss the distinctive cryptographic primitives used by these protocols, without examining any of these critters too closely.

In essence, our taxonomy splits as blind signatures vs. verifiable random functions (VRFs) vs. randomness beacons, with the latter consisting of publicly verifiable secret sharing (PVSS) and verifiable delay functions (VDFs). We only have time for a cursory look at the mathematics usable to build each of these, but this should explain some of their uses, strengths, and weaknesses.