Open iljah opened 5 years ago
I'm skeptical that this is suitable for Bitmessage.
could you develop please and give a few links on related articles ?
Thank you.
Stman.
Ilja:
Has anyone investigated whether some type of proof of space would be suitable for bm? It should narrow the gap between phones and desktops/GPUs/FPGAs. There are lots of pdfs on eprint.iacr.org about this topic. Latest ones seem to deal with proofs of replicated storage but that wouldn't be required for bm.
Proof of storage or similar would be easier if sender or recipient were known, in which case spam protection could be (probably partially) based on number of messages to or from someone.
I think there are types of proof of storage that can be verified without two-way communication which would be suitable for BM. In case offline proofs aren't possible online proofs could also be generated whenever two nodes exchange messages. Either each one would prove that they're storing some older messages or that they're storing messages they just received.
Naturally these aren't immune to attacks, especially when sender and receiver are unknown, but I suspect these would be more difficult to attack than sha512 PoW.
One aspect of private sender & receiver is that verifiable delay functions and similar, as well as some/most? proofs of space, don't help as they only prevent parallelization of pow for one message and attackers can instead send several messages simultaneously.
Thank you for these informations, it is very interesting.
Kind regards,
Frederic. a.k.a stman.
Le 20 janv. 2019 à 17:03, Ilja notifications@github.com a écrit :
Proof of storage or similar would be easier if sender or recipient were known, in which case spam protection could be (probably partially) based on number of messages to or from someone.
I think there are types of proof of storage that can be verified without two-way communication which would be suitable for BM. In case offline proofs aren't possible online proofs could also be generated whenever two nodes exchange messages. Either each one would prove that they're storing some older messages or that they're storing messages they just received.
Naturally these aren't immune to attacks, especially when sender and receiver are unknown, but I suspect these would be more difficult to attack than sha512 PoW.
— You are receiving this because you commented. Reply to this email directly, view it on GitHub, or mute the thread.
I would have to read through all of that, those that I looked at explained how miners compete with each other, which makes sense for a blockchain, but isn't the case with Bitmessage.
https://eprint.iacr.org/2018/702 looks like a good one to start from, they don't discuss blockchains. Miner competition might be good to see discussed though since in that case proof of space is non-interactive meaning it might be easier to implement in bm as messages could include everything needed for PoSpace. Otherwise some back and forth would be required when messages are relayed in the network.
"A PoS is an interactive protocol between a prover and verifier in which the prover use a minimum specified amount of space in order to pass verification." In other words, this isn't suitable for Bitmessage as it would have to be asynchronous.
I think that this may be worth researching some time in the future but there is no urgency.
Has anyone investigated whether some type of proof of space would be suitable for bm? It should narrow the gap between phones and desktops/GPUs/FPGAs. There are lots of pdfs on eprint.iacr.org about this topic. Latest ones seem to deal with proofs of replicated storage but that wouldn't be required for bm.