PoSME: Proof of Sequential Memory Execution via Latency-Bound Pointer Chasing with Causal Hash Binding
TLDR
PoSME is a cryptographic primitive enforcing sequential memory execution via latency-bound pointer chasing with causal hash binding.
Key contributions
- Enforces strict linear sequential memory execution steps.
- Offers high time-memory trade-off resistance with a quadratic space-time lower bound.
- Limits ASIC advantage by DRAM random-access latency, not bandwidth.
Why it matters
PoSME introduces a novel cryptographic primitive for enforcing sustained sequential computation, crucial for various security applications. It effectively resists time-memory trade-offs and limits ASIC advantages, making it robust against specialized hardware.
Original Abstract
We introduce PoSME (Proof of Sequential Memory Execution), a cryptographic primitive that enforces sustained sequential computation via latency-bound pointer chasing over a mutable arena. Each step reads data-dependent addresses, writes a block whose value and causal hash are mutually dependent (symbiotic binding), and chains the result into a global transcript. This yields three properties: (1) strict linear sequential memory-step enforcement, (2) high time-memory trade-off resistance (a tenfold penalty at a write density of 4, with a formal space-time lower bound that scales quadratically with the number of steps), and (3) a tight ASIC advantage bound by DRAM random-access latency rather than bandwidth. Benchmarks across 17 CPU platforms and 4 GPU architectures demonstrate that hash computation is under 3.5 percent of step cost and GPU hardware is 14 to 19 times slower than a consumer CPU. POSME requires no trusted setup and provides a foundation for verifiable delay, authorship attestation, and Sybil resistance.
📬 Weekly AI Paper Digest
Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.