ArXiv TLDR

PoSME: Proof of Sequential Memory Execution via Latency-Bound Pointer Chasing with Causal Hash Binding

🐦 Tweet
2604.15751

David L. Condrey

cs.CRcs.DC

TLDR

PoSME is a cryptographic primitive enforcing sequential memory execution via latency-bound pointer chasing with causal hash binding.

Key contributions

  • Enforces strict linear sequential memory execution steps.
  • Offers high time-memory trade-off resistance with a quadratic space-time lower bound.
  • Limits ASIC advantage by DRAM random-access latency, not bandwidth.

Why it matters

PoSME introduces a novel cryptographic primitive for enforcing sustained sequential computation, crucial for various security applications. It effectively resists time-memory trade-offs and limits ASIC advantages, making it robust against specialized hardware.

Original Abstract

We introduce PoSME (Proof of Sequential Memory Execution), a cryptographic primitive that enforces sustained sequential computation via latency-bound pointer chasing over a mutable arena. Each step reads data-dependent addresses, writes a block whose value and causal hash are mutually dependent (symbiotic binding), and chains the result into a global transcript. This yields three properties: (1) strict linear sequential memory-step enforcement, (2) high time-memory trade-off resistance (a tenfold penalty at a write density of 4, with a formal space-time lower bound that scales quadratically with the number of steps), and (3) a tight ASIC advantage bound by DRAM random-access latency rather than bandwidth. Benchmarks across 17 CPU platforms and 4 GPU architectures demonstrate that hash computation is under 3.5 percent of step cost and GPU hardware is 14 to 19 times slower than a consumer CPU. POSME requires no trusted setup and provides a foundation for verifiable delay, authorship attestation, and Sybil resistance.

📬 Weekly AI Paper Digest

Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.