all InfoSec news
Bankrupting Sybil Despite Churn. (arXiv:2010.06834v4 [cs.CR] UPDATED)
cs.CR updates on arXiv.org arxiv.org
A Sybil attack occurs when an adversary controls multiple identifiers (IDs)
in a system. Limiting the number of Sybil (bad) IDs to a minority is critical
to the use of well-established tools for tolerating malicious behavior, such as
Byzantine agreement and secure multiparty computation.
A popular technique for enforcing a Sybil minority is resource burning: the
verifiable consumption of a network resource, such as computational power,
bandwidth, or memory. Unfortunately, typical defenses based on resource burning
require non-Sybil (good) IDs …
adversary attack bad bandwidth computation computational controls critical ids malicious malicious behavior memory network popular power secure multiparty computation system tools