Redirigiendo al acceso original de articulo en 22 segundos...
Inicio  /  Algorithms  /  Vol: 16 Par: 10 (2023)  /  Artículo
ARTÍCULO
TITULO

Hashcash Tree, a Data Structure to Mitigate Denial-of-Service Attacks

Mario Alviano    

Resumen

Client puzzle protocols are widely adopted mechanisms for defending against resource exhaustion denial-of-service (DoS) attacks. Among the simplest puzzles used by such protocols, there are cryptographic challenges requiring the finding of hash values with some required properties. However, by the way hash functions are designed, predicting the difficulty of finding hash values with non-trivial properties is impossible. This is the main limitation of simple proof-of-work (PoW) algorithms, such as hashcash. We propose a new data structure combining hashcash and Merkle trees, also known as hash trees. In the proposed data structure, called hashcash tree, all hash values are required to start with a given number of zeros (as for hashcash), and hash values of internal nodes are obtained by hashing the hash values of child nodes (as for hash trees). The client is forced to compute all hash values, but only those in the path from a leaf to the root are required by the server to verify the proof of work. The proposed client puzzle is implemented and evaluated empirically to show that the difficulty of puzzles can be accurately controlled.

 Artículos similares

       
 
Pablo Sanchez-Jerez, Lotte Krüger, Nuria Casado-Coy, Carlos Valle and Carlos Sanz-Lazaro    
Fish farm facilities become colonized by biofouling, and in situ cleaning activities may increase the accumulation of biofouling, mostly shell-hash, on the sediment. However, there is a lack of knowledge about the effect of fish farming on this process. ... ver más

 
Diego Renza, Jaime Andres Arango and Dora Maria Ballesteros    
This paper addresses a problem in the field of audio forensics. With the aim of providing a solution that helps Chain of Custody (CoC) processes, we propose an integrity verification system that includes capture (mobile based), hash code calculation and ... ver más
Revista: Applied Sciences