From: Adam Back <aba@dcs.ex.ac.uk>
To: schear@lvdi.net
Message Hash: fc16c8c26c409c48f22196710f6c14e925e352eed3ec5656583019779d94d869
Message ID: <199801182157.VAA00551@server.eternity.org>
Reply To: <v03102802b0e4c4e06860@[208.129.55.202]>
UTC Datetime: 1998-01-18 22:16:34 UTC
Raw Date: Mon, 19 Jan 1998 06:16:34 +0800
From: Adam Back <aba@dcs.ex.ac.uk>
Date: Mon, 19 Jan 1998 06:16:34 +0800
To: schear@lvdi.net
Subject: hashcash / Dwork-Naor paper (Re: RSA Conference: Deterence measures for SPAM)
In-Reply-To: <v03102802b0e4c4e06860@[208.129.55.202]>
Message-ID: <199801182157.VAA00551@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain
Steve Schear <schear@lvdi.net> writes on cypherpunks:
> Kevin McCurley, IBM, delivered a paper on using electronic commerce
> techniques (i.e., d-postage) to deter SPAM. He cites a work by
> Cynthia Dwork and Moni Naor, "Pricing via Processing or Combatting
> Junk Mail,"
> http://www.wisdom.weizmann.ac.il/Papers/trs/CS95-20/abstract.html I
> wan't able to access that paper and would be interested to know how
> similar their appraoch is to HashCash.
I had a look and their approach is very similar to that of hashcash.
Thanks for posting the reference, I found the paper very interesting,
and have contacted the authors (and Kevin (who is also webmaster of
www.digicrime.com)) with comments. Their work predates hashcash by
about 4 years. They have the same idea of using a CPU cost function
to combat unsolicited bulk email and other unmetered resource abuses.
Their cost functions are not based on hash collisions, but on public
key problems. The use of public key problems allows them to construct
a trap-door cost function. The holder of the private key can compute
valid tokens cheaply. This allows them to propose a third party which
sells bulk email tokens without itself having to have large CPU
resources. Their example application is what they see as legitimate
bulk emails, like conference calls. (I am not sure I always agree
with this -- I get no end of spam conference calls which I have no
interest in attending or submitting to, but the functionality of
trap-door cost functions does allow more flexibility).
Their cost functions are more expensive to verify than hashcash
because they involve modular exponentations.
I can simulate the short cut cost function functionality with
symmetric encryption techniques by modifying the hashcash protocol.
Users, or service providers wishing to participate in enabling a third
party to sell tokens to bulk emailers for their email address(es) can
aid the third party in bypassing the hashcash verification process on
their eternity filter.
This can be done with no databases on the ISP mail hub server
(preserving privacy), and with no real time communications required
between trusted bulk email token seller and mail hub.
Adam
Return to January 1998
Return to “Steve Schear <schear@lvdi.net>”