I'm wondering how applicable RPOW is. Generally speaking, all the practical applications I can think of for a proof-of-work are defeated if proofs-of-work are storable, transferable, or reusable.
I have some code to play online games with cryptographic protection, cards and dice,
and I am planning to modify it to let people make bets with RPOWs as
the betting chips.
If you think of POW as a possible SPAM mitigation, how does the first receiving MTA assure the next MTA in line that a message was "paid for?" Certainly the mail relay doesn't want to do new work, but the second MTA doesn't know that the first isn't a spambot.
--------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
