Getting started
Introduction
Definitions
Ideas and Theory
Use Case
Constructions
How it Works?
Related Protocols
Open Problems
Useful resources
Documentation
Outreach Talks
References
Documentation on Proof of Space
Proof of Space and Replication
- stoRNA: Stateless Transparent Proofs of Storage-time. Reyhaneh Rabaninejad, Behzad Abdolmaleki, Giulio Malavolta, Antonis Michalas, and Amir Nabizadeh IACR Cryptology ePrint Archive, Report 2023/515. URL: https://eprint.iacr.org/2023/515
- Proof of storage-time: Efficiently checking continuous data availability. Ateniese, G., Chen, L., Etemad, M., Tang, Q.: In: NDSS (2020) URL: https://eprint.iacr.org/2020/840
- Proofs of Replicated Storage Without Timing Assumptions. Ivan Damgård, Chaya Ganesh, Claudio Orlandi In: Advances in Cryptology – CRYPTO 2019 URL: https://eprint.iacr.org/2018/654.pdf
- Spacemint: A cryptocurrency based on proofs of space. S. Park, A. Kwon, G. Fuchbauer, P. Gazi, J. Alwen, and K. Pietrzak. In Proceedings of the 22nd International Conference on Financial Cryptography and Data Security (FC). Springer, 2018. URL: http://fc18.ifca.ai/preproceedings/78.pdf.
- Proofs of space on useful data. B. Fisch. Poreps: IACR Cryptology ePrint Archive, 2018:678, 2018. URL: https://eprint.iacr.org/2018/678.
- Tight proofs of space and replication. B. Fisch. IACR Cryptology ePrint Archive, Report 2018/702, 2018. URL: https://eprint.iacr.org/2018/702.
- Filecoin: A decentralized storage network. Protocol Labs 2017. URL: https://filecoin.io/filecoin.pdf
- Beyond hellman’s time-memory trade-offs with applications to proofs of space. H. Abusalah, J. Alwen, B. Cohen, D. Khilko, K. Pietrzak, and L. Reyzin. In Advances in Cryptology ASIACRYPT 2017 Proceedings, Part II, volume 10625 of Lecture Notes in Computer Science, pages 357–379. Springer, 2017. URL: https://eprint.iacr.org/2017/893.pdf
- Proofs of space. S. Dziembowski, S. Faust, V. Kolmogorov, and K. Pietrzak. In Advances in Cryptology CRYPTO 2015 Proceedings, Part II, volume 9216 of Lecture Notes in Computer Science, pages 585–605. Springer, 2015. URL: https://www.iacr.org/archive/crypto2015/92160192/92160192.pdf
- Proofs of Space: When Space is of the Essence. Giuseppe Ateniese, Ilario Bonacina, Antonio Faonio, and Nicola Galesi. In Security and Cryptography for Networks. SCN 2014. Lecture Notes in Computer Science, vol 8642. Springer URL: https://eprint.iacr.org/2013/805
- Provable data possession at untrusted stores. G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song. In: Proceedings of the 14th ACM conference on Computer and communications security. pp. 598–609. ACM (2007) URL: https://eprint.iacr.org/2007/202.pdf
Proof of Retrievability
- Pors: proofs of retrievability for large files. Ari Juels and Burton S. Kaliski Jr. In ACM CCS 2007, pages 584–597. ACM Press, October 2007 URL: https://eprint.iacr.org/2007/243
- Compact proofs of retrievability. Hovav Shacham and Brent Waters. In ASIACRYPT 2008, volume 5350 of LNCS, pages 90–107. Springer, Heidelberg, December 2008. URL: https://eprint.iacr.org/2008/073.pdf
- Proofs of retrievability via hardness amplification. Yevgeniy Dodis, Salil P. Vadhan, and Daniel Wichs. In TCC 2009, volume 5444 of LNCS, pages 109–127. Springer, Heidelberg, March 2009. URL: https://eprint.iacr.org/2009/041.pdf
Proof of Secure erasure
- Secure code update for embedded devices via proofs of secure erasure. Daniele Perito and Gene Tsudik. In ESORICS 2010, volume 6345 of LNCS, pages 643–662. Springer, 2010 URL: https://eprint.iacr.org/2010/217.pdf