Research Article
Exploiting Approximate Transitivity of Trust
@INPROCEEDINGS{10.1109/BROADNETS.2007.4550477, author={Ruggero Morselli and Bobby Bhattacharjee and Jonathan Katz and Michael Marsh}, title={Exploiting Approximate Transitivity of Trust}, proceedings={4th International IEEE Conference on Broadband Communications, Networks, Systems}, publisher={IEEE}, proceedings_a={BROADNETS}, year={2010}, month={5}, keywords={}, doi={10.1109/BROADNETS.2007.4550477} }
- Ruggero Morselli
Bobby Bhattacharjee
Jonathan Katz
Michael Marsh
Year: 2010
Exploiting Approximate Transitivity of Trust
BROADNETS
IEEE
DOI: 10.1109/BROADNETS.2007.4550477
Abstract
Social networks, of which webs of trust are a particular type, have been shown to be effective ways of moving information with minimal external configuration, setup, or management. For applications requiring information assurance, a web of trust is an appealing system architecture, since trust is an inherent component of both the network design and assurance. The trust in a typical web of trust is not transitive, however, making the construction of an application with strong assurance difficult or impossible. Instead, in this paper we examine a notion of weak assurance that can be provided by a web of trust, and might be “good enough” for many applications. As a motivating example, and to provide a more concrete basis for exposition, we present KeyChains, a peer-to-peer system that operates over a distributed web of trust to provide fully decentralized public key publishing and retrieval. In addition to weak assurance guarantees, Key- Chains also provides an audit trail for public keys retrieved. Our analysis and simulations show that the resulting system is both efficient and secure.