User Authentication and dht

Suppose I only have DHT (distributed hash table) implemented (in Python) and I want to create an authentication service through a P2P network, but without implementing a centralized authentication server with such a service. Can this be done, and if so, how can I achieve this?

I am familiar with how Skype and Wuala did this, but I am looking for a decentralized solution without a single point of failure.

+3
source share
2 answers

The real problem is trusting the information you receive. In this case, you must at least authenticate the person to whom you receive the information. The question is good, but for really good solutions you will need to consider ranking algorithms.

They work a bit like Pretty Good Privacy (PGP), where trusted relationships are distributed and used to authenticate the recommendation chain. There are many academic studies on this subject:


  • , 01- 05 ISBN: 0-7695-1993-8.

    , " ", " ", , . 420, 14- (DEXA'03), 2003 .


  • 6, 1/2007, . 40 - 55

+3

, , [s] . DHT, , , , , , [ DHT- ]

0

Source: https://habr.com/ru/post/1726131/


All Articles