On the establishment of distinct identifies in overlay networks

Rida Bazzi, Goran Konjevod

Research output: Chapter in Book/Report/Conference proceedingConference contribution

36 Scopus citations

Abstract

We study ways to restrict or prevent the damage that can be caused in a peer-to-peer network by corrupt entities creating multiple pseudonyms. We show that it is possible to remotely issue certificates that can be used to test the distinctness of identities. To our knowledge, this is the first work that shows that remote anonymous certification of identity is possible under adversarial conditions. Our certification protocols are based on geometric techniques that establish location information in a fault-tolerant and distributed fashion. They do not rely on a centralized certifying authority or infrastructure that has direct knowledge of entities in the system, and work in Euclidean or spherical geometry of arbitrary dimension. Our protocols tolerate corrupt entities, including corrupt certifiers as well as collusion by certification applicants and certifiers. We consider both broadcast and point-to-point message passing models.

Original languageEnglish (US)
Title of host publicationProceedings of the Annual ACM Symposium on Principles of Distributed Computing
Pages312-320
Number of pages9
Volume24
DOIs
StatePublished - 2005
Event24th Annual ACM Symposium on Principles of Distributed Computing, PODC 2005 - Las Vegas, NV, United States
Duration: Jul 17 2005Jul 20 2005

Other

Other24th Annual ACM Symposium on Principles of Distributed Computing, PODC 2005
Country/TerritoryUnited States
CityLas Vegas, NV
Period7/17/057/20/05

Keywords

  • Distance geometry
  • Fault-tolerance
  • Identity verification
  • Overlay networks
  • Peer-to-peer systems
  • Security
  • Sybil attack

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'On the establishment of distinct identifies in overlay networks'. Together they form a unique fingerprint.

Cite this