Establishing trust protocols in mutual distrust network by consensus formation
DOI:
https://doi.org/10.30837/rt.2019.3.198.07Keywords:
Consensus Formation in Social Networks, Voter Model, Trust Formation in Computer networks, Hierarchical PKI, Distributed PKI, Distributed Verification Protocols, Post-quantum Period, Blockchain TechnologyAbstract
Any interactions between actors take place through networks of connections between them. An important goal is to ensure the security of such interactions, especially in advent of quantum computing technologies. It might be that in the post-quantum world, the avatar of verification architectures will be manifested through distributed protocols. Here we augment the discussion by explicitely drawing the analogy between distributed protocol consensus formation and consensus formation in social networks in various topologies. Hierarchical networks, in both domains, exhibit slowest timescale of consensus formation. We conclude this supports universal argument towards establishment of distributed protocol mechanisms, wherever the scaleability with network size is of relevance.References
Jan Lorenz. Continuous Opinion Dynamics Under Bounded Confidence: a Survey // J. Mod. Phys. C 18, 1819-1838 (2007).
Claudio Castellano, Santo Fortunato and Vittorio Loreto. Statistical physics of social dynamics // Rev. Mod. Phys. 81, 591 (2009).
Petter Holme and M. E. J. Newman. Nonequilibrium phase transition in the coevolution of networks and opinions // Phys. Rev. E 74, 056108 (2006).
Thomas M. Liggett. Interacting Particle Systems. Springer, Berlin (2012).
Juan Fern a´ndez-Gracia, Krzysztof Suchecki, Jose´ J. Ramasco, Maxi San Miguel, and V´ıctor M. Egu´ıluz, Is the Voter Model a Model for Voters? // JPhys. Rev. Lett. 112, 158701 (2014).
Quantum Safe Cryptography and Security; An introduction, benefits, enablers and challenges. Quantum Safe Cryptography // ETSI White paper, 2015
ISO / IEC 9594-8 ITU – T Rec. The X.509 ”The Basic s e PROVISIONS certification key and certificate at-tributes”.
PKI: technology, architecture, construction and implementation: a tutorial / Potiy A.V., Lenshin A.V., So-roka L.S., Esin V.I., Moroz B.I. Dnepropetrovsk : Akadimiya border service of Ukraine 2011. 202 pp.
Draft NISTIR 8202 : Blockchain Technology Overview.
Satoshi Nakamoto. Bitcoin: A Peer-to-Peer Electronic Cash System. Technical report.
Isirova Kateryna. Decentralized Public Key Infrastructure Development Principles / Kateryna Isirova, Oleksandr Potii // The 9th IEEE International Conference on Dependable Systems, Services and Technologies, DESSERT’2018, 24-27 May, 2018, Kyiv, Ukraine. P. 320-326.
K. Isirova, Blockchain technology as the perspective instrument for ensuring electronic trusted services in conditions of cyberthreats // European Cybersecurity Journal. Volume 5 (2019), Issue 1, pp. 34-42.
Stefan L a¨mmer, Hiroshi Kori, Karsten Peters and Dirk Helbing. Decentralised control of material or traffic flows in networks using phase-synchronisation // Physica A 363, 39-47 (2006).
Laura Alessandretti, Abeer ElBahrawy, Luca Maria Aiello and Andrea Baronchelli. Anticipating Cryptocurrency Prices Using Machine Learning // Complexity 2018, 8983590 (2016).
Deepak Puthal, Nisha Malik, Saraju P. Mohanty, Elias Kougianos and Chi Yang. The Blockchain as a Decentralized Security Framework // IEEE Consumer Electronics Magazine 7, 18 (2018).
Zibin Zheng, Shaoan Xie, Hongning Dai, Xiangping Chen and Huaimin Wang. An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends // 2017 IEEE 6th International Congress on Big Data, DOI: 10.1109/BigDataCongress.2017.85.
Francesco Parino, Mariano G. Beir o´ and Laetitia Gauvin. Analysis of the Bitcoin blockchain: socio-economic factors behind the adoption // EPJ Data Science 7, 38 (2018).
Downloads
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).