Decentralized and Sybil-resistant Pseudonym Registration using Social Graphs

被引:0
|
作者
Friebe, Sebastian [1 ]
Florian, Martin [1 ]
Baumgart, Ingmar [2 ]
机构
[1] KIT, Karlsruhe, Germany
[2] FZI Res Ctr Informat Technol, Karlsruhe, Germany
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A registration of identities is necessary in a wide array of systems, from online forums to smart environments. While pseudonyms are, in most cases, sufficient, mechanisms must be put in place to prevent malicious adversaries from registering great numbers of sybil identities. Preventing such sybil attacks becomes an especially significant challenge when the existence of a trusted party cannot be assumed. Several countermeasures against sybil attacks on decentralized systems have been proposed that are based on leveraging information from the social graph between participating users. While promising, existing solutions typically require knowledge of the complete social graph, which is a privacy issue, or are tailored towards specific applications like distributed hash tables. In this paper, we propose an approach for registering general-purpose pseudonyms in a completely decentralized manner while keeping social relationships private. Joining users collect confirmations from a fraction of already registered users while being aware only of their own neighbors in the social graph. Using the presented SybilHedge algorithm, sybil attackers are limited in the number of confirmations they can collect. We present an evaluation of the algorithm and discuss its practical application.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Sybil-resistant DHT routing
    Danezis, G
    Lesniewski-Laas, C
    Kaashoek, MF
    Anderson, R
    COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, 2005, 3679 : 305 - 318
  • [2] Voting with Time Commitment for Decentralized Governance: Bond Voting as a Sybil-Resistant Mechanism
    Mohan, Vijay
    Khezr, Peyman
    Berg, Chris
    MANAGEMENT SCIENCE, 2024, 70 (12) : 8709 - 8734
  • [3] TrustChain: A Sybil-resistant scalable blockchain
    Otte, Pim
    de Vos, Martijn
    Pouwelse, Johan
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 107 : 770 - 780
  • [4] ReCon: Sybil-resistant consensus from reputation
    Biryukov, Alex
    Feher, Daniel
    PERVASIVE AND MOBILE COMPUTING, 2020, 61
  • [5] A Sybil-Resistant Truth Discovery Framework for Mobile Crowdsensing
    Lin, Jian
    Yang, Dejun
    Wu, Kun
    Tang, Jian
    Xue, Guoliang
    2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019), 2019, : 871 - 880
  • [6] Sybil-Resistant Meta Strategies for the Forwarder's Dilemma
    Durmus, Yunus
    Loukas, Andreas
    Langendoen, Koen
    Onur, Ertan
    2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SELF-ADAPTIVE AND SELF-ORGANIZING SYSTEMS (SASO), 2014, : 90 - 99
  • [7] Zero-Knowledge Proof of Distinct Identity: a Standard-compatible Sybil-resistant Pseudonym Extension for C-ITS
    Tao, Ye
    Wu, Hongyi
    Javanmardi, Ehsan
    Tsukada, Manabu
    Esaki, Hiroshi
    2024 35TH IEEE INTELLIGENT VEHICLES SYMPOSIUM, IEEE IV 2024, 2024, : 1828 - 1835
  • [8] A Sybil-Resistant Admission Control Coupling SybilGuard with Distributed Certification
    Lesueur, Francois
    Me, Ludovic
    Tong, Valerie Viet Triem
    17TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURES FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2008, : 105 - 110
  • [9] Two-Step Boosting for OSN Based Sybil-Resistant Trust Value of Non-Sybil Identities
    Kim, Kyungbaek
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2014, E97D (07): : 1918 - 1922
  • [10] Sybil-resistant Truth Discovery in Crowdsourcing by Exploiting the Long-tail Effect
    Lin, Dejia
    Wu, Yongdong
    Gan, Wensheng
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 1545 - 1550