Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Zero knowledge protocols and metadata resistant decentralised networks #11

Open
gpestana opened this issue Aug 26, 2018 · 2 comments
Open

Comments

@gpestana
Copy link
Owner

gpestana commented Aug 26, 2018

How can zero proof knowledge protocols help building metadata resistant and decentralised communication protocols?

@gpestana gpestana changed the title Zero knowledge proof and metadata resistant systems Zero knowledge protocols and metadata resistant decentralised networks Aug 27, 2018
@gpestana
Copy link
Owner Author

gpestana commented Aug 27, 2018

literature

  • Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture (zk-SNARKS)
    paper

  • Quadratic Span Programs and Succinct NIZKs without PCPs
    paper

  • Simple verifiable protocol
    write up of a simple verifiable non-interactive zero-knowledge (NIZK) protocol for computational execution verification that only requires symmetric crypto
    txt-link

  • MiniLEGO: Efficient Secure Two-Party Computation from General Assumptions
    the work presents a XOR-homomorphic commitment scheme based on oblivious transfer, that can be use to cope with the problem of connecting the gates in the LEGO construction.
    paper

  • Routing in the Dark: Pitch Black
    shows how the Freenet darknet routing algorithm for decentralised restricted-routing topologies (e.g. friend-2-friend) can be attacked by low-resourced attackers, which may lead to severe damage of network content availability.
    paper, dissertation
    summary and notes

@gpestana
Copy link
Owner Author

gpestana commented Aug 27, 2018

in practice

1. mitigate the freenet swapping protocol attack: the Freenet swapping protocol for improving routing performance of restricted-routing DHT topologies is vulnerable to attacking nodes that lie about their neighbours and their existence. could a 0k protocol help mitigating this attack?

the problem: swapping protocol attack on friend-to-friend routing algorithm

ideas/notes:

  • the protocol can be interactive (prover is in contact and interacting with verifier)
  • while verification performance is important, it is not critical. the topology structure will take longer with a 0k protocol verification, but its upside - mitigating the attack - pays off.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant