Jump to content

Zooko's triangle

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Indolering (talk | contribs) at 00:44, 26 April 2020 (Removed editorialized comment regarding motivations about why the original blogpost no longer exists.). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Zooko's triangle defines the three desirable traits of a network protocol identifier as Human-meaningful, Decentralized and Secure.

Zooko's triangle is a trilemma of three properties that are generally considered desirable for names of participants in a network protocol:[1]

  • Human-meaningful: Meaningful and memorable (low-entropy) names are provided to the users.
  • Secure: The amount of damage a malicious entity can inflict on the system should be as low as possible.
  • Decentralized: Names correctly resolve to their respective entities without the use of a central authority or service.

Overview

Zooko Wilcox-O'Hearn conjectured that no single kind of name can achieve more than two. For example: DNSSec offers a decentralized, human-meaningful naming scheme, but is not secure against compromise by the root; .onion addresses and bitcoin addresses are secure and decentralized but not human-meaningful; and I2P uses name translation services which are secure (as they run locally) and provide human-meaningful names - but fail to provide unique entities when used globally in a decentralised network without authorities.

Solutions

Several systems which exhibit all three properties of Zooko's triangle have now been created, including:

  • Computer scientist Nick Szabo's paper "Secure Property Titles with Owner Authority" illustrated that all three properties can be achieved up to the limits of Byzantine fault tolerance.[2]
  • Activist Aaron Swartz described a naming system based on Bitcoin employing Bitcoin's distributed blockchain as a proof-of-work to establish consensus of domain name ownership.[3] These systems remain vulnerable to Sybil attack,[4] but are secure under Byzantine assumptions.

Several platforms implement refutations of Zooko's conjecture, including: Twister (which use the later Aaron Swartz system with a bitcoin-like system), Blockstack (separate blockchain), Namecoin (separate blockchain), and Monero OpenAlias.[5]

See also

References

  1. ^ Zooko Wilcox-O'Hearn. "Names: Decentralized, Secure, Human-Meaningful: Choose Two". Archived from the original on 20 October 2001.
  2. ^ Nick Szabo, Secure Property Titles, 1998
  3. ^ Aaron Swartz, Squaring the Triangle: Secure, Decentralized, Human-Readable Names, Aaron Swartz, January 6, 2011
  4. ^ Dan Kaminsky, Spelunking the Triangle: Exploring Aaron Swartz’s Take On Zooko’s Triangle, January 13, 2011
  5. ^ Monero core team (19 September 2014). "OpenAlias". Retrieved 3 February 2015.