A survey of DHT security techniques

G Urdaneta, G Pierre, MV Steen - ACM Computing Surveys (CSUR), 2011 - dl.acm.org
Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable
attention ever since their introduction in 2001. Unfortunately, DHT-based systems have been …

Brahms: Byzantine resilient random membership sampling

E Bortnikov, M Gurevich, I Keidar, G Kliot… - Proceedings of the twenty …, 2008 - dl.acm.org
We present Brahms, an algorithm for sampling random nodes in a large dynamic system
prone to malicious behavior. Brahms stores small membership views at each node, and yet …

Proof of work without all the work

D Gupta, J Saia, M Young - … of the 19th international conference on …, 2018 - dl.acm.org
Proof-of-work (PoW) is an algorithmic tool used to secure networks by imposing a
computational cost on participating devices. Unfortunately, traditional PoW schemes require …

A fully-distributed scalable peer-to-peer protocol for byzantine-resilient distributed hash tables

J Augustine, S Chatterjee, G Pandurangan - Proceedings of the 34th …, 2022 - dl.acm.org
Performing computation in the presence of faulty and malicious nodes is a central problem
in distributed computing. Over 35 years ago, Dwork, Peleg, Pippenger, and Upfal [STOC …

Highly dynamic distributed computing with byzantine failures

R Guerraoui, F Huc, AM Kermarrec - … of the 2013 ACM symposium on …, 2013 - dl.acm.org
This paper shows for the first time that distributed computing can be both reliable and
efficient in an environment that is both highly dynamic and hostile. More specifically, we …

Commensal cuckoo: Secure group partitioning for large-scale services

S Sen, MJ Freedman - ACM SIGOPS Operating Systems Review, 2012 - dl.acm.org
We present commensal cuckoo,* a secure group partitioning scheme for large-scale
systems that maintains the correctness of many small groups, despite a Byzantine adversary …

Poisoning the kad network

T Locher, D Mysicka, S Schmid… - … Conference on Distributed …, 2010 - Springer
Since the demise of the Overnet network, the Kad network has become not only the most
popular but also the only widely used peer-to-peer system based on a distributed hash …

A Sybil-proof one-hop DHT

C Lesniewski-Laas - Proceedings of the 1st workshop on Social network …, 2008 - dl.acm.org
Decentralized systems, such as structured overlays, are subject to the Sybil attack, in which
an adversary creates many false identities to increase its influence. This paper describes a …

Practical robust communication in dhts tolerating a byzantine adversary

M Young, A Kate, I Goldberg… - 2010 IEEE 30th …, 2010 - ieeexplore.ieee.org
There are several analytical results on distributed hash tables (DHTs) that can tolerate
Byzantine faults. Unfortunately, in such systems, operations such as data retrieval and …

Adding query privacy to robust DHTs

M Backes, I Goldberg, A Kate, T Toft - … of the 7th ACM Symposium on …, 2012 - dl.acm.org
Interest in anonymous communication over distributed hash tables (DHTs) has increased in
recent years. However, almost all known solutions solely aim at achieving sender or …