On the establishment of distinct identities in overlay networks

We study ways to restrict or prevent the damage that can be caused in a peer-to-peer network by corrupt entities creating multiple pseudonyms. We show that it is possible to remotely issue certificates that can be used to test the distinctness of identities. Our certification protocols are based on...

Full description

Saved in:
Bibliographic Details
Published inDistributed computing Vol. 19; no. 4; pp. 267 - 287
Main Authors Bazzi, Rida A., Konjevod, Goran
Format Journal Article
LanguageEnglish
Published 01.03.2007
Online AccessGet full text

Cover

Loading…
More Information
Summary:We study ways to restrict or prevent the damage that can be caused in a peer-to-peer network by corrupt entities creating multiple pseudonyms. We show that it is possible to remotely issue certificates that can be used to test the distinctness of identities. Our certification protocols are based on geometric techniques that establish location information in a fault-tolerant and distributed fashion. They do not rely on a centralized certifying authority or infrastructure that has direct knowledge of entities in the system, and work in Euclidean or spherical geometry of arbitrary dimension. They tolerate corrupt entities, including corrupt certifiers, collusion by either certification applicants or certifiers, and either a broadcast or point-to-point message model.
Bibliography:ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
ISSN:0178-2770
1432-0452
DOI:10.1007/s00446-006-0012-y