1 code implementation • 21 Mar 2022 • Trisha Chakraborty, Shaswata Mitra, Sudip Mittal, Maxwell Young
Proof of Work (PoW) based cyberdefense systems require incoming network requests to expend effort solving an arbitrary mathematical puzzle.
no code implementations • 12 Oct 2020 • Diksha Gupta, Jared Saia, Maxwell Young
Here, we present a new Sybil defense, ERGO, that guarantees (1) there is always a minority of bad IDs; and (2) when the system is under significant attack, the good IDs consume asymptotically less resources than the bad.
Cryptography and Security Distributed, Parallel, and Cluster Computing C.2.4; C.4