On the feasibility of a censorship resistant decentralized name system

13Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A central problem on the Internet today is that key infrastructure for security is concentrated in a few places. This is particularly true in the areas of naming and public key infrastructure. Secret services and other government organizations can use this fact to block access to information or monitor communications. One of the most popular and easy to perform techniques is to make information on the Web inaccessible by censoring or manipulating the Domain Name System (DNS). With the introduction of DNSSEC, the DNS is furthermore posed to become an alternative PKI to the failing X.509 CA system, further cementing the power of those in charge of operating DNS. This paper maps the design space and gives design requirements for censorship resistant name systems. We survey the existing range of ideas for the realization of such a system and discuss the challenges these systems have to overcome in practice. Finally, we present the results from a survey on browser usage, which supports the idea that delegation should be a key ingredient in any censorship resistant name system. © 2014 Springer International Publishing Switzerland.

Cite

CITATION STYLE

APA

Wachs, M., Schanzenbach, M., & Grothoff, C. (2014). On the feasibility of a censorship resistant decentralized name system. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8352 LNCS, pp. 19–30). Springer Verlag. https://doi.org/10.1007/978-3-319-05302-8_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free