Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
ICNP '03 Proceedings of the 11th IEEE International Conference on Network Protocols
Admission control in Peer-to-Peer: design and performance evaluation
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Efficient Node Admission for Short-lived Mobile Ad Hoc Networks
ICNP '05 Proceedings of the 13TH IEEE International Conference on Network Protocols
Practical threshold signatures
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Energy-efficient and non-interactive self-certification in MANETs
SSS'06 Proceedings of the 8th international conference on Stabilization, safety, and security of distributed systems
Threshold RSA for dynamic and ad-hoc groups
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
Simulations, models, and testbeds: A mutual catalysis
Performance Evaluation
Hi-index | 0.00 |
Central trusted instances as well as predefined security policies are not available in spontaneously established peer-to-peer environments. The former can be addressed by joint decision processes based on threshold cryptography. To compensate the latter, users can be involved directly in security-relevant decisions. In this case, minimizing the number of users involved is a necessary optimization goal to keep user-based joint decisions feasible for real-world deployment. Still, a certain redundancy has to be introduced when taking into account users that do not provide their decision in a reasonable amount of time. In this paper we scrutinize different interaction schemes for joint decision processes. We develop stochastic models that describe the outcome subject to the number of users requested and the probability with which one user provides his decision in time. The derived closed-form representation of the models serves as a tool for governing the decision process, allowing for a real-time minimization of the number of users involved.