Posts tagged Cyber Identity
Deception, Identity, and Security: The Game Theory of Sybil Attacks

Communications of the ACM, January 2019
By William Casey, Ansgar Kellner, et al.

"Along with the low cost of minting and maintaining identities, a lack of constraints on using identities is a primary factor that facilitates adversarial innovations that rely on deception. With these factors in mind, we study the following problem: Will it be possible to engineer a decentralized system that can enforce honest usage of identity via mutual challenges and costly consequences when challenges fail?"

Read More