Zooko's triangle

From Wikipedia, the free encyclopedia
Revision as of 06:59, 19 September 2024 by imported>Stesmo (External links: Pruned external links to meet WP:EL. Add as cites to source claims as appropriate in the article.)
(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Template:Short description Template:Use dmy dates

File:Zooko's Triangle.svg
Zooko's triangle defines three traits of a network protocol identifier as Human-meaningful, Decentralized and Secure.

Zooko's triangle is a trilemma of three properties that some people consider desirable for names of participants in a network protocol:[1]

  • Human-meaningful: Meaningful and memorable (low-entropy) names are provided to the users.
  • Secure: The amount of damage a malicious entity can inflict on the system should be as low as possible.
  • Decentralized: Names correctly resolve to their respective entities without the use of a central authority or service.

Overview

Zooko Wilcox-O'Hearn conjectured that no single kind of name can achieve more than two. For example: DNSSec offers a human-meaningful, secure naming scheme, but is not decentralized as it relies on trusted root-servers; .onion addresses and bitcoin addresses are secure and decentralized but not human-meaningful; and I2P uses name translation services which are secure (as they run locally) and provide human-meaningful names – but fail to provide unique entities when used globally in a decentralised network without authorities.Template:Efn

Solutions

Several systems that exhibit all three properties of Zooko's triangle include:

  • Computer scientist Nick Szabo's paper "Secure Property Titles with Owner Authority" illustrated that all three properties can be achieved up to the limits of Byzantine fault tolerance.[2]
  • Activist Aaron Swartz described a naming system based on Bitcoin employing Bitcoin's distributed blockchain as a proof-of-work to establish consensus of domain name ownership.[3] These systems remain vulnerable to Sybil attack,[4] but are secure under Byzantine assumptions.
  • Theoretician Curtis Yarvin implemented a decentralized version of IP addresses in Urbit that hash to four-syllable, human-readable names.[5]

Several platforms implement refutations of Zooko's conjecture, including: Twister (which use Swartz' system with a bitcoin-like system), Blockstack (separate blockchain), Namecoin (separate blockchain), LBRY (separate blockchain – content discovery, ownership, and peer-to-peer file-sharing),Script error: No such module "Unsubst". Monero, OpenAlias,[6] Ethereum Name Service, and the Handshake Protocol.[7]

See also

Notes

Template:Notelist

References

Template:Reflist


Template:Object-capability security

  1. Script error: No such module "citation/CS1".
  2. Nick Szabo, Secure Property Titles Template:Webarchive, 1998
  3. Aaron Swartz, Squaring the Triangle: Secure, Decentralized, Human-Readable Names Template:Webarchive, Aaron Swartz, 6 January 2011
  4. Dan Kaminsky, Spelunking the Triangle: Exploring Aaron Swartz’s Take On Zooko’s Triangle Template:Webarchive, 13 January 2011
  5. Script error: No such module "citation/CS1".
  6. Script error: No such module "citation/CS1".
  7. Script error: No such module "citation/CS1".