I'm wondering how applicable RPOW is.  Generally speaking, all
the practical applications I can think of for a proof-of-work
are defeated if proofs-of-work are storable, transferable, or
reusable.

I have some code to play online games with cryptographic protection, cards and dice,
and I am planning to modify it to let people make bets with RPOWs as
the betting chips.

If you think of POW as a possible SPAM mitigation, how does the first receiving MTA assure the next MTA in line that a message was "paid for?" Certainly the mail relay doesn't want to do new work, but the second MTA doesn't know that the first isn't a spambot.


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to