Bitcoin Forum
June 27, 2024, 10:26:19 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2]  All
  Print  
Author Topic: Using k-SUM to Create an ASIC/FPGA Resistant PoW  (Read 1402 times)
tromp
Legendary
*
Offline Offline

Activity: 988
Merit: 1108


View Profile
June 22, 2014, 05:09:01 PM
 #21

Quote
and assume d = O(n^3).

I'm using the assumption that d == n.


That's no good. If you aim to use 1Gbit of memory (128MB), and
set d = n = 2^30, then there are about (n choose 3)/d ~ 2^60/6
solutions, taking forever to try all, and you're not progress-free.

Like I said before, you need to choose d and n so that you expect at
most one solution.
optimiz3 (OP)
Newbie
*
Offline Offline

Activity: 37
Merit: 0



View Profile
June 22, 2014, 06:24:09 PM
 #22

Quote
Like I said before, you need to choose d and n so that you expect at
most one solution.

I suppose so - working through all this it seems we've established kSUM is equivalent to the Birthday Problem but with k collisions instead of two.
tromp
Legendary
*
Offline Offline

Activity: 988
Merit: 1108


View Profile
June 22, 2014, 06:33:03 PM
 #23

Then 3-SUM can be solved in O(n) memory and O(n^2) time, by storing all h_i
as keys in a set S, and running

for i = 1 to n
   for j =i+1 to n
      if S contains -(h_i + h_j) mod d
        then 3-SUM found

You've got another problem here in that it is trivial to trade-off memory for time
(e.g. do the above twice, first for half of S that is even, then for the other half that's odd).

So 2-SUM and 3-SUM both seem to be memory-easy rather than memory-hard.

4-SUM and higher don't seem immune to such trade-offs either.
optimiz3 (OP)
Newbie
*
Offline Offline

Activity: 37
Merit: 0



View Profile
June 22, 2014, 06:39:10 PM
 #24

Yes - agreed.  Better to establish equivalence to an existing problem now than later.  Appreciate the feedback and glad this structure was explored more thoroughly.
Pages: « 1 [2]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!