Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay

  • Alex Biryukov
  • Ivan PustogarovEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8975)


In this paper we propose a new micropayments scheme which can be used to reward Tor relay operators. Tor clients do not pay Tor relays with electronic cash directly but submit proof of work shares which the relays can resubmit to a crypto-currency mining pool. Relays credit users who submit shares with tickets that can later be used to purchase improved service. Both shares and tickets when sent over Tor circuits are anonymous. The analysis of the crypto-currencies market prices shows that the proposed scheme can compensate significant part of Tor relay operator’s expenses.


Tor Proof of work Crypto-currency Micropayment Mining pools 


  1. 1.
    Abe, M., Okamoto, T.: Provably secure partially blind signatures. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 271–286. Springer, Heidelberg (2000) Google Scholar
  2. 2.
    AlSabah, M., Bauer, K., Elahi, T., Goldberg, I.: The path less travelled: overcoming Tor’s Bottlenecks with traffic splitting. In: De Cristofaro, E., Wright, M. (eds.) PETS 2013. LNCS, vol. 7981, pp. 143–163. Springer, Heidelberg (2013) Google Scholar
  3. 3.
    Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R., Sherman, A. (eds.) Advances in Cryptology, pp. 199–203. Springer, US (1983)Google Scholar
  4. 4.
    CoinWars: Crypto Currencies (2014).
  5. 5.
    Crypto-Currency Market Capitalizations (2014).
  6. 6.
    Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium, August 2004Google Scholar
  7. 7.
    Evans, J.W., Filsfils, C.: Deploying IP and MPLS QoS for Multiservice Networks: Theory & Practice. Morgan Kaufmann Publishers Inc., San Francisco (2007)Google Scholar
  8. 8.
    From Onions to Shallots: Rewarding Tor Relays with TEARS (2014).
  9. 9.
    Hetzner Online Server Auction (2014).
  10. 10.
  11. 11.
  12. 12.
    Jansen, R., Hopper, N., Kim, Y.: Recruiting new Tor relays with BRAIDS. In: Keromytis, A.D., Shmatikov, V. (eds.) Proceedings of the 2010 ACM Conference on Computer and Communications Security (CCS 2010), ACM, October 2010Google Scholar
  13. 13.
    Jansen, R., Johnson, A., Syverson, P.: LIRA: lightweight incentivized routing for anonymity. In: Proceedings of the Network and Distributed System Security Symposium - NDSS 2013. Internet Society, February 2013Google Scholar
  14. 14.
    Linux HTB Home Page (2014).
  15. 15.
    Ghosh, M., Richardson, M., Ford, B., Jansen, R.: A TorPath to TorCoin: proof-of-bandwidth altcoins for compensating relays. In: 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), July 2014Google Scholar
  16. 16.
    Massive spike of Tor users caused by Mevade botnet (2014).
  17. 17.
    Miers, I., Garman, C., Green, M., Rubin, A.D.: Zerocoin: anonymous distributed e-cash from bitcoin. In: IEEE Symposium on Security and Privacy (2013)Google Scholar
  18. 18.
    “Johnny” Ngan, T.-W., Dingledine, R., Wallach, D.S.: Building incentives into Tor. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 238–256. Springer, Heidelberg (2010) Google Scholar
  19. 19.
    Ostrovsky, R.: A proposal for internet computation commerce: how to tap the power of the web. In: Presentation at CRYPTO 1998 rump session (1998)Google Scholar
  20. 20.
    Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 6–24. Springer, Heidelberg (2013) Google Scholar
  21. 21.
    Tor Metrics: Performance (2014).
  22. 22.
    Windows GPU Miners for the More Commonly Used Crypto Algorithms (2014).

Copyright information

© Springer-Verlag Berlin Heidelberg 2015

Authors and Affiliations

  1. 1.University of LuxembourgWalferdangeLuxembourg

Personalised recommendations