Proof of Work (Cannot, Can, Does Currently) Work

25 Pages Posted: 27 Jul 2012

See all articles by L. Jean Camp

L. Jean Camp

Indiana University Bloomington - School of Informatics and Computing

Debin Liu

Indiana University

Date Written: August 15, 2007

Abstract

The core enabling factor of spam is that spam is cheap to send. Spam is so profitable that estimates of the percentage of email as spam ranges from 56% [Brightmail, 04] in 2003 to 80% [Ciphertrust, 2005] in 2006. Spam is a malicious network activity enabled by the otherwise virtuous cycle of network expansion. As the network expands, spam becomes more profitable, and thus increases.

A proposed economic and cryptographic solution to the profitability of spam is proof of work. Proof of work comprises a set of proposals, in which email senders would be required to pay money, perform a resource intensive computation, [Dwork and Noar, 1993], perform a series of memory operations, [Dwork, Goldberg and Naor, 2003], or post a bond, [Krihsamurthy and Blackmond, 2004] for each message sent. Thus the cost to send an email or initiate a connection is usually expressed in seconds as a measure of processing power or memory operations.

The design goal of POW is to deter spam by making it unprofitable to send a large number of messages, while enabling legitimate users to send small numbers of messages. Therefore, POW reverses the economics of email, to prevent spam. Yet by reversing the economics of email, POW can significantly hinder senders of legitimate email. This cost to legitimate email is exactly the reason that the first economic analysis illustrated that POW would not work. The argument was that any work requirement sufficient to prevent spammers from profiting is so high that it would harm senders of legitimate emails, especially on low power devices. [Laurie and Clayton, 2004] The basic argument underlying that analysis is that legitimate and malicious email producers have very different production costs. Legitimate senders of email purchase equipment and connectivity on the open market. Spammers have at their disposal large networks of subverted machines that provide automated networked platforms for mass production of illegal activities. The networks of subverted machines are called botnets. Botnets available for rent are as large as 10,000. Botnets are the criminal leveraging of peer production.

Recently, using a simple model of reputation systems, the authors illustrated that proof of work can work when combined with the currently used commercial anti-spam technologies. Our proof of concept illustrated the simple observation that email characteristics, particularly the characteristics of the sender, can be used to offer varying POW costs to different senders. The paper submitted here is an expansion of that initial This was supported in part by NET Institute. http://www.netinst.org/ analysis to include not only a sensitivity analysis, but also an analysis about the definition of Proof of Work. The first is a sensitivity analysis of the basic POW model previously presented. What duration of punishment is required? How many people must participate? The second is an analysis of the nature of Proof of Work both as functional money (token versus notational) and as mechanisms in practice. For example, in this paper we argue that POW effectively also already exist in the form of reverse turing tests and response requirements.

Suggested Citation

Camp, L. Jean and Liu, Debin, Proof of Work (Cannot, Can, Does Currently) Work (August 15, 2007). TPRC 2007, Available at SSRN: https://ssrn.com/abstract=2118235

L. Jean Camp (Contact Author)

Indiana University Bloomington - School of Informatics and Computing ( email )

901 E 10th St
Bloomington, IN 47401
United States

Debin Liu

Indiana University ( email )

107 S Indiana Ave
100 South Woodlawn
Bloomington, IN 47405
United States

Do you have negative results from your research you’d like to share?

Paper statistics

Downloads
44
Abstract Views
688
PlumX Metrics