4th International IEEE Conference on Broadband Communications, Networks, Systems

Research Article

Exploiting Approximate Transitivity of Trust

  • @INPROCEEDINGS{10.1109/BROADNETS.2007.4550477,
        author={Ruggero Morselli and Bobby Bhattacharjee and Jonathan Katz and Michael Marsh},
        title={Exploiting Approximate Transitivity of Trust},
        proceedings={4th International IEEE Conference on Broadband Communications, Networks, Systems},
        publisher={IEEE},
        proceedings_a={BROADNETS},
        year={2010},
        month={5},
        keywords={},
        doi={10.1109/BROADNETS.2007.4550477}
    }
    
  • Ruggero Morselli
    Bobby Bhattacharjee
    Jonathan Katz
    Michael Marsh
    Year: 2010
    Exploiting Approximate Transitivity of Trust
    BROADNETS
    IEEE
    DOI: 10.1109/BROADNETS.2007.4550477
Ruggero Morselli1,*, Bobby Bhattacharjee1,*, Jonathan Katz1,*, Michael Marsh1,*
  • 1: University of Maryland
*Contact email: ruggero@cs.umd.edu, bobby@cs.umd.edu, jkatz@cs.umd.edu, mmarsh@cs.umd.edu

Abstract

Social networks, of which webs of trust are a particular type, have been shown to be effective ways of moving information with minimal external configuration, setup, or management. For applications requiring information assurance, a web of trust is an appealing system architecture, since trust is an inherent component of both the network design and assurance. The trust in a typical web of trust is not transitive, however, making the construction of an application with strong assurance difficult or impossible. Instead, in this paper we examine a notion of weak assurance that can be provided by a web of trust, and might be “good enough” for many applications. As a motivating example, and to provide a more concrete basis for exposition, we present KeyChains, a peer-to-peer system that operates over a distributed web of trust to provide fully decentralized public key publishing and retrieval. In addition to weak assurance guarantees, Key- Chains also provides an audit trail for public keys retrieved. Our analysis and simulations show that the resulting system is both efficient and secure.