Skip to main content

Unified Proof of Work: Delegating and Solving Customized Computationally Bounded Problems in a Privacy-Preserving Way

  • Conference paper
  • First Online:
Web and Big Data (APWeb-WAIM 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13423))

  • 634 Accesses

Abstract

Proof of work (PoW), which was initially introduced for combating junk email spam, is extremely energy-thirsty, but the computed outcomes are of very little relevance to any practical usage. Some existing works tackle this issue by replacing the useless cryptographic puzzles with some pre-determined practical problems. However, the allowable problem types are usually limited and fixed, and some problems are of no significant value. This paper presents a Unified Proof of Work (UPoW) mechanism using flexible problems as puzzles, which features a computation-trading platform where delegators post their problems and PoW executors compute them as a by-product. The proposed UPoW puts known problem types together and frames them as verifiable computation problems using Fully Homomorphic Encryptions (FHE) techniques to replace PoW puzzles. It also secures and preserves the functionality of the delegated problems, which is showcased by delegating a Private Set Intersection (PSI) problem.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.microsoft.com/en-us/research/project/microsoft-seal/.

References

  1. Ball, M., Rosen, A., Sabin, M., Vasudevan, P.N.: Proofs of useful work. IACR Cryptol. ePrint Arch. 2017, 203 (2017)

    Google Scholar 

  2. Dwork, C., Naor, M.: Pricing via processing or combatting junk mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139–147. Springer, Heidelberg (1993). https://doi.org/10.1007/3-540-48071-4_10

    Chapter  Google Scholar 

  3. Fan, J., Vercauteren, F.: Somewhat practical fully homomorphic encryption. IACR Cryptol. ePrint Arch. 2012, 144 (2012)

    Google Scholar 

  4. Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing, pp. 169–178 (2009)

    Google Scholar 

  5. Hu, H., Xu, J., Xu, X., Pei, K., Choi, B., Zhou, S.: Private search on key-value stores with hierarchical indexes. In: 2014 IEEE 30th International Conference on Data Engineering, pp. 628–639. IEEE (2014)

    Google Scholar 

  6. Nakamoto, S.: Re: Bitcoin P2P e-cash paper. The Cryptography Mailing List (2008)

    Google Scholar 

  7. On, S.T., Xu, J., Choi, B., Hu, H., He, B.: Flag commit: supporting efficient transaction recovery in flash-based DBMSs. IEEE Trans. Knowl. Data Eng. 24(9), 1624–1639 (2011)

    Article  Google Scholar 

  8. Qu, X., Wang, S., Hu, Q., Cheng, X.: Proof of federated learning: a novel energy-recycling consensus algorithm. IEEE Trans. Parallel Distrib. Syst. 32(8), 2074–2085 (2021)

    Article  Google Scholar 

  9. Shoker, A.: Sustainable blockchain through proof of exercise. In: 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA), pp. 1–9. IEEE (2017)

    Google Scholar 

Download references

Acknowledgement

This work was supported by National Natural Science Foundation of China (Grant No: 62072390, 62102334), and the Research Grants Council, Hong Kong SAR, China (Grant No: 15222118, 15218919, 15203120, 15226221, 15225921, and C2004-21GF).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yue Fu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fu, Y., Ye, Q., Du, R., Hu, H. (2023). Unified Proof of Work: Delegating and Solving Customized Computationally Bounded Problems in a Privacy-Preserving Way. In: Li, B., Yue, L., Tao, C., Han, X., Calvanese, D., Amagasa, T. (eds) Web and Big Data. APWeb-WAIM 2022. Lecture Notes in Computer Science, vol 13423. Springer, Cham. https://doi.org/10.1007/978-3-031-25201-3_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-25201-3_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-25200-6

  • Online ISBN: 978-3-031-25201-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics