Nsdi '09: 6th Usenix Symposium on Networked Systems Design and Implementation Trust and Privac Y Trinc: Small Trusted Hardware for Large Distributed

Devesh Agrawal, Michael Golightly, Evan Jones, Eric Keller, Wyatt Lloyd,Jeff Terrace, Patrick Verkaik, Micah Best, Rik Farrow,Eric M. Hielscher, Ben Hindman, Leo Meyerovich, Vitaly Chipounov, Simon Peter,Tudor Salomie, Adrian Schüpbach, Akhilesh Singhania, Qin Yin, Cristian Zamfir

semanticscholar(2009)

引用 0|浏览0
暂无评分
摘要
Dave described how equivocation, making conflicting statements to others, is a very common and powerful tool for selfish and malicious users in distributed systems. It occurs in the Byzantine general’s problem, voting, and BitTorrent, where traditionally 3f+1 users are needed to tolerate f malicious users. By using trusted hardware, equivocation can be made impossible, and now only 2f+1 users are needed to reach consensus. To be practical, such trusted hardware needs to be small in order for it to be easily verifiable, ubiquitous via low cost, and tamper resilient. Dave then displayed a SmartCard that had TrInc, a trusted incrementer, implemented on it. TrInc consists only of a monotonically increasing counter and a key for signing attestations; a set of TrInc counters makes up what is called a trinket. There are two types of TrInc attestations: an advance attestation that increments a counter and forever binds a message to the counter’s value, and a status attestation that allows peers to determine others’ current counter values.
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要