Foundations, Properties, and Security Applications of Puzzles: A Survey

04/23/2019
by   Isra Mohamed Ali, et al.
0

Cryptographic algorithms have been used not only to create robust ciphertexts, but also to generate cryptograms that, contrary to the classic goal of cryptography, are meant to be broken. These cryptograms, generally called puzzles, required the use of a certain amount of resources to find the solution, introducing a time delay and, in some cases, an economic cost. These powerful features have made puzzles the core of many security protocols, giving them increasingly importance in the IT security landscape. The concept of puzzle has subsequently been extended to other types of schemes that do not use cryptographic functions, like CAPTCHAs, used to discriminate humans from machines, and has experienced a renewed interest with the advent of Bitcoin. In this paper, we provide a comprehensive study of the most important puzzle construction schemes present in the literature, categorizing them according to several attributes, such as resource type, verification type, and applications. We have redefined the term puzzle by collecting and integrating the scattered notions used in different works, to cover all the existing applications. Finally, we provide an overview of the possible applications, identifying key requirements and different design approaches. Then, we highlight features and limitations of each approach, providing a useful guide for the future development of new puzzle schemes.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/16/2017

Fingerprinting Cryptographic Protocols with Key Exchange using an Entropy Measure

Encryption has increasingly been used in all applications for various pu...
research
03/18/2019

Security and Privacy on Blockchain

Blockchain offers an innovative approach to storing information, executi...
research
12/27/2020

Towards Threshold Key Exchange Protocols

Threshold schemes exist for many cryptographic primitives like signature...
research
06/24/2021

Circuit Masking: From Theory to Standardization, A Comprehensive Survey for Hardware Security Researchers and Practitioners

Side-channel attacks extracting sensitive data from implementations have...
research
11/18/2021

Pell hyperbolas in DLP-based cryptosystems

We present a study on the use of Pell hyperbolas in cryptosystems with s...

Please sign up or login with your details

Forgot password? Click here to reset