2014
DOI: 10.1007/978-3-319-05302-8_2
|View full text |Cite
|
Sign up to set email alerts
|

On the Feasibility of a Censorship Resistant Decentralized Name System

Abstract: Abstract. A central problem on the Internet today is that key infrastructure for security is concentrated in a few places. This is particularly true in the areas of naming and public key infrastructure. Secret services and other government organizations can use this fact to block access to information or monitor communications. One of the most popular and easy to perform techniques is to make information on the Web inaccessible by censoring or manipulating the Domain Name System (DNS). With the introduction of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0
2

Year Published

2014
2014
2019
2019

Publication Types

Select...
5
3
1

Relationship

3
6

Authors

Journals

citations
Cited by 15 publications
(15 citation statements)
references
References 7 publications
0
13
0
2
Order By: Relevance
“…An alternative to NameID is re-claimID (Schanzenbach et al, 2018), which uses the decentralized GNU Name System (GNS) (Wachs et al, 2014a;Wachs et al, 2014b). reclaimID allows users to be completely sovereign over their own identities and selectively authorize access to identity attributes using attribute-based encryption (ABE).…”
Section: Integrationmentioning
confidence: 99%
“…An alternative to NameID is re-claimID (Schanzenbach et al, 2018), which uses the decentralized GNU Name System (GNS) (Wachs et al, 2014a;Wachs et al, 2014b). reclaimID allows users to be completely sovereign over their own identities and selectively authorize access to identity attributes using attribute-based encryption (ABE).…”
Section: Integrationmentioning
confidence: 99%
“…By manipulating the DNS, a censor can restrict access to sensitive content in an effective and scalable manner. Simply put, DNS queries for blacklisted sites can generate a range of responses [5]: an error, an incorrect IP address or an IP address to a non-existent server.…”
Section: B Domain Name Filteringmentioning
confidence: 99%
“…The GNU Name System [41] and a proposal by Tan and Sherr [40] use a Distributed Hash Table (DHT) maintained by users to mirror all peers' name records and mappings rendezvous points. DHTs, however, do not provide strong privacy protections; extensions that add anonymity to DHTs [3,42] generally rely on strong assumptions such as the absence of Sybil attacks [26] and provide only loose probabilistic guarantees for a single query, and unknown protection against longterm traffic analysis.…”
Section: Related Workmentioning
confidence: 99%