3
3 years agoby martindaleat difficulty 2

Decentralized systems, such as structured overlays, are subject to the Sybil attack, in which an adversary creates many false identities to increase its influence. This paper describes a one-hop distributed hash table which uses the social links between users to strongly resist the Sybil attack. This is the first sublinear solution to this problem. Preliminary simulation results are presented to demonstrate the approach’s effectiveness.

Sybil-Proofing DHTs
http://pdos.csail.mit.edu/papers/sybil-dht-socialnets08.pdf
Decentralized systems, such as structured overlays, are subject to the Sybil attack, in which an adversary creates many false identities to increase its influence. This paper describes a one-hop distributed hash table which uses the social links between users to strongly resist the Sybil attack. This is the first sublinear solution to this problem. Preliminary simulation results are presented to demonstrate the approach’s effectiveness.
2:2:sha3:20150719:0053007900620069006c002d00500072006f006f00660069006e006700200044004800540073::zaiym:1300
Only showing top-level comments. To see a thread, click "reply".

For now, we require a user account to participate. If you'd like to change this, look at martindale/converse#7.

Built with Maki and deployed to the Fabric network.

decentralize all the things.