Skip to main content
SpringerLink
Log in
Menu
Find a journal Publish with us
Search
Go to cart
Book cover

Annual International Cryptology Conference

CRYPTO 1992: Advances in Cryptology — CRYPTO’ 92 pp 139–147Cite as

  1. Home
  2. Advances in Cryptology — CRYPTO’ 92
  3. Conference paper
Pricing via Processing or Combatting Junk Mail

Pricing via Processing or Combatting Junk Mail

  • Cynthia Dwork4 &
  • Moni Naor4 
  • Conference paper
  • First Online: 01 January 2001
  • 8230 Accesses

  • 374 Citations

  • 63 Altmetric

Part of the Lecture Notes in Computer Science book series (LNCS,volume 740)

Abstract

We present a computational technique for combatting junk mail in particular and controlling access to a shared resource in general. The main idea is to require a user to compute a moderately hard, but not intractable, function in order to gain access to the resource, thus preventing frivolous use. To this end we suggest several pricing functions, based on, respectively, extracting square roots modulo a prime, the Fiat-Shamir signature scheme, and the Ong-Schnorr-Shamir (cracked) signature scheme.

Keywords

  • Hash Function
  • Signature Scheme
  • Difference Parameter
  • Price Function
  • Hard Function

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Download conference paper PDF

References

  1. M. Blum and S. Micali, personal communication.

    Google Scholar 

  2. E. Biham and A. Shamir, Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI, and Lucifer, Crypto’ 91 abstracts.

    Google Scholar 

  3. B. den Boer and A. Bosselaers, An attack on the last two rounds of MD4, Crypto’ 91 abstracts.

    Google Scholar 

  4. E. F. Brickell and A. M. Odlyzko, Cryptanalysis: A Survey of Recent Results, Proceedings of the IEEE, vol. 76, pp. 578–593, May 1988.

    CrossRef  Google Scholar 

  5. D. Coppersmith, Another Birthday Attack, Proc. CRYPTO’ 85, Springer Verlag, LNCS, Vol. 218, pp. 369–378.

    Google Scholar 

  6. A. Fiat and A. Shamir, How to prove yourself, Proc. of Crypto 86, pp. 641–654.

    Google Scholar 

  7. B. A. Huberman, The Ecology of Computing, Studies in Computer Science and Artificial Intelligence 2, North Holland, Amsterdam, 1988.

    Google Scholar 

  8. R. Impagliazzo and M. Naor, Cryptographic schemes provably secure as subset sum, Proc. of the 30th FOCS, 1989.

    Google Scholar 

  9. K. McCurley, Odd and ends from cryptology and computational number theory, in Crypttoloy and computational number theory, edited by C. Pomerance, AMS short course, 1990, pp. 145–166.

    Google Scholar 

  10. R. C. Merkle, One Way Functions and DES, Proc. of Crypto’89, pp. 428–446.

    Google Scholar 

  11. R. C. Merkle, Fast Software One-Way Hash Function, J. of Cryptology Vol 3, No. 1, pp. 43–58, 1990.

    CrossRef  MATH  MathSciNet  Google Scholar 

  12. H. Ong, C. P. Schnorr and A. Shamir, An efficient signature scheme based on quadratic equations, Proc 16th STOC, 1984, pp. 208–216.

    Google Scholar 

  13. H. Ong, C. P. Schnorr and A. Shamir, Efficient signature scheme based on polynomial equations, Proc of Crypto 84, pp. 37–46.

    Google Scholar 

  14. J. M. Pollard and C. P. Schnorr, Solution of X 2 + ky 2 = m mod n, IEEE Trans. on Information Theory., 1988.

    Google Scholar 

  15. M. O. Rabin, Digital Signatures and Public Key Functions as Intractable as Factoring Technical Memo TM-212, Lab. for Computer Science, MIT, 1979.

    Google Scholar 

  16. R._L. Rivest, The MD4 Message Digest Algorithm, Proc of Crypto’90, pp. 303–311.

    Google Scholar 

  17. R. Schroepel and A. Shamir, A T = O(2n/2), S = O(2n/4) algorithm for certain NP-complete problems. SIAM J. Computing, 10 (1981), pp. 456–464.

    CrossRef  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. IBM Almaden Research Center, 650 Harry Road, San Jose, CA, 95120

    Cynthia Dwork & Moni Naor

Authors
  1. Cynthia Dwork
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Moni Naor
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Department 1423, Sandia National Laboratories, PO Box 5800, Albuquerque, NM, 87185, USA

    Ernest F. Brickell

Rights and permissions

Reprints and Permissions

Copyright information

© 1993 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dwork, C., Naor, M. (1993). Pricing via Processing or Combatting Junk Mail. In: Brickell, E.F. (eds) Advances in Cryptology — CRYPTO’ 92. CRYPTO 1992. Lecture Notes in Computer Science, vol 740. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48071-4_10

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/3-540-48071-4_10

  • Published: 18 May 2001

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-57340-1

  • Online ISBN: 978-3-540-48071-6

  • eBook Packages: Springer Book Archive

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Search

Navigation

  • Find a journal
  • Publish with us

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support

3.82.220.82

Not affiliated

Springer Nature

© 2023 Springer Nature