[Cryptography] Implementations, attacks on DHTs, Mix Nets?

Christian Huitema huitema at huitema.net
Wed Aug 28 01:02:23 EDT 2013


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> The DHT model says that millions of Raspberry Pi's and thumb drives together implement 
> this immense database.  But since a DHT, by design, scatters the data around the network 
> at random, *my* thumb drive is full of information that I will never need - all the 
> information *I* need is out there, somewhere - where, based on the research we've been 
> discussing, I have no secure way to get at it.  Why would I buy into such a design?  Doesn't 
> it make much more sense for me to store the information relevant to me?

When we designed PNRP, I was pretty adamant to avoid this business of storing other people's data. We assumed that your data would be stored locally. The cost is a bit of added synchronization cost, effectively scaling as the number of records that have to be published. But if you are looking at a P2P name server type application, there are very few such records. 

Basically, the less nodes rely on strangers, the better.

- -- Christian Huitema


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.20 (MingW32)
Comment: Using gpg4o v3.1.107.3564 - http://www.gpg4o.de/
Charset: utf-8

iQEcBAEBAgAGBQJSHYReAAoJELba05IUOHVQuJsH/2W+6CLtc+IRjH/7ufNhlIx8
F8H30+vt3D1QxikluwKkzBB3HVxSiZL1N1z5z63Vvi9a+nIzuJPX8xNJf27tvvp7
gcHQqTz3J/Ffa2pX0fjtr83bpfBg+x27b7T4gBdbuN1KZ3sesQaHXWurCV2bz3Nb
9IDn2PYBOna+FXM/fMA8cpvElb+C6rEDvO0hcW1CVIxutt3yLICR3rAnyzhFQSUP
7MbnOZ7iSXRrmgvY3ukmI+OsAf9iOEavxdmgMYJJj1istyg1PMHcFH3MPoxggrfl
9ESTc1wiiZYsVF3r0SXf0DI08J8z7RXzJ/0WY9PUGgxQ49CEYgsq9ZSpUUfEm7Y=
=4LGc
-----END PGP SIGNATURE-----



More information about the cryptography mailing list