SoK: The Ghost Trilemma

08/04/2023
by   S. Mukherjee, et al.
0

Trolls, bots, and sybils distort online discourse and compromise the security of networked platforms. User identity is central to the vectors of attack and manipulation employed in these contexts. However it has long seemed that, try as it might, the security community has been unable to stem the rising tide of such problems. We posit the Ghost Trilemma, that there are three key properties of identity – sentience, location, and uniqueness – that cannot be simultaneously verified in a fully-decentralized setting. Many fully-decentralized systems – whether for communication or social coordination – grapple with this trilemma in some way, perhaps unknowingly. In this Systematization of Knowledge (SoK) paper, we examine the design space, use cases, problems with prior approaches, and possible paths forward. We sketch a proof of this trilemma and outline options for practical, incrementally deployable schemes to achieve an acceptable tradeoff of trust in centralized trust anchors, decentralized operation, and an ability to withstand a range of attacks, while protecting user privacy.

READ FULL TEXT
research
12/08/2021

Towards the classification of Self-Sovereign Identity properties

Self-Sovereign Identity (SSI) is a novel and emerging, decentralized ide...
research
03/21/2023

Leveraging Self-Sovereign Identity in Decentralized Data Aggregation

Data aggregation has been widely implemented as an infrastructure of dat...
research
04/12/2022

A Note on the Blockchain Trilemma for Decentralized Identity: Learning from Experiments with Hyperledger Indy

The challenge to establish and verify human identity over the Internet i...
research
09/22/2022

Zero Trust Federation: Sharing Context under User Control toward Zero Trust in Identity Federation

To securely control access to systems, the concept of Zero Trust has bee...
research
10/20/2020

Optimal Linear Coding Schemes for the Secure Decentralized Pliable Index Coding Problem

We study the secure decentralized Pliable Index CODing (PICOD) problem w...
research
05/02/2020

Binding of Endpoints to Identifiers by On-Chain Proofs

In many applications, identity management (IdM) is used to associate a s...
research
05/27/2022

How to Tame Multiple Spending in Decentralized Cryptocurrencies

The last decade has seen a variety of Asset-Transfer systems designed fo...

Please sign up or login with your details

Forgot password? Click here to reset