Computational puzzles as Sybil defenses

被引:59
作者
Borisov, Nikita [1 ]
机构
[1] Univ Illinois, Dept Elect & Comp Engn, Urbana, IL 61801 USA
来源
SIXTH IEEE INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS | 2006年
关键词
D O I
10.1109/P2P.2006.10
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider the problem of defending against Sybil attacks using computational puzzles. A fundamental difficulty in such defenses is enforcing that puzzle solutions not be reused by attackers over time. We propose a fully decentralized scheme to enforce this by continually distributing locally generated challenges that are then incorporated into the puzzle solutions. Our approach consists of an all-to-all broadcast of challenges, with a combining function to ensure this can be done efficiently. The combining function generates certificates that can be used to prove that each node's challenge was delivered to and used by each other node, therefore proving the freshness of each puzzle. We show how our distribution and verification mechanisms can be implemented on top of the the Chord [21] overlay.
引用
收藏
页码:171 / 176
页数:6
相关论文
共 23 条
[1]  
ABRAHAM I, 2003, P INT PAR DISTR PROC
[2]  
ADLER M, 2003, P 35 ACM S THEOR COM
[3]  
[Anonymous], FED INF PROC STAND P
[4]  
[Anonymous], EUROCRYPT
[5]  
Back Adam, 1997, HASHCASH DENIAL SERV
[6]  
CASTRO M, 2002, OSDI
[7]  
CIACCIO G, 2006, INT C WEB APPL SERVI
[8]  
DANEZIS G, 2005, 10 EUR S RES COMPUTE
[9]  
Douceur J.R., 2002, P 1 INT PEER PEER SY
[10]  
DWORK C, 1992, CYRPTO