Proof-of-Personhood
How to resist Sibyl attacks
1
DEDIS, EPFL Linus Gasser, Philipp Jovanovic, Eleftherios Kokoris, Frederic Pont, Bryan Ford
Proof-of-Personhood How to resist Sibyl attacks DEDIS, EPFL Linus - - PowerPoint PPT Presentation
Proof-of-Personhood How to resist Sibyl attacks DEDIS, EPFL Linus Gasser, Philipp Jovanovic, Eleftherios Kokoris, Frederic Pont, Bryan Ford 1 The Sybil Identity Problem Internet has no protection from malicious users cheaply creating a few
How to resist Sibyl attacks
1
DEDIS, EPFL Linus Gasser, Philipp Jovanovic, Eleftherios Kokoris, Frederic Pont, Bryan Ford
Internet has no protection from malicious users cheaply creating a few (or many) fake accounts
Fundamental unsolved decentralization problem
The Sybil Identity Problem
2
Major approaches proposed so far:
Mapping the Known Solution Space
3
Trusted third-party verifies government-issued ID
Downsides:
“Real names” and verified identities
4
Collect fingerprints, iris, etc., record in database
Downsides:
biometric fingerprints
Biometric collection & verification
5
Rate-limit Sybil attacks via artificial barrier-to-entry
Downsides:
Proof-of-Investment
6
Classic P2P idea in SybilLimit, SumUp, etc. Assumes nodes are cheap but edges are expensive to a Sybil attacker. Downsides:
○ Facebook/LinkedIn/etc: many friend promiscuously
○ Easy for many people, or everyone, to cheat a little
Graph analysis on trust networks
7
Build anonymous one-per-person tokens
in-person voter registration or PGP key signing
Downsides:
Pseudonym Parties
8
Objective: Number of tokens per person = 1 How: Organizing a party in which people are verified, but not identified
Proof of Personhood
9
Pseudonym-party - Setup
10
Organizers
Anytrust
Attendees
Anonymity- group
Room
Configuration Name, Purpose, Place, Time
Step 1: Pseudonym-party - Configuration
11
Organizers
Each organizer signs the configuration
Collective Signature Blockchain
Configuration and Signature stored on
Step 2: Attendee Configuration
12
https://applivery.com/popcoin Pop-party #11 4th of September 2018 BC410
Step 3: Start of Party
13
Be sure to:
version from https://applivery.com/ popcoin
the party
Step 4: Barrier Point - Exit and Scan
14
You’re allowed to exit the party. Be sure to have your public key scanned by all the organizers!
Step 5a: Creation of Party Transcript
15
Organizers
Organizers reach consensus
Collective Signature Configuration Public Keys Party Transcript
Step 5b: Storage of Party Transcript
16
Is sent to
Party Transcript Blockchain Smart Contract Anonymous Accounts
Calls Creates
Step 5c: Tokenization of Attendee’s Keypair
17
Party transcript Keypair PoP-token
Usage of PoP-Coins and PoP-Tokens
18
Attendee
Transfers Coins
Economic
Other Attendees Services
Social
Sybil-resistant Twitter Spam-protected Communication Voting Deliberation
Democratic
Signs Anonymously
Details of Anonymous Signatures
19
Attendee
Request Each service trusts the Party Transcript
Services
Each service holds a list of tags: Message + Context Signature + Tag ...
Log
conode.gasser.blue:7770
20
Next steps
○ Creating and answering Questionnaires ○ PoP-twitter where sending costs money and reading gets you money ○ Get coins from a token to get a certain amount of coins and being able to exchange coins
21