Definitions

Version 5.1 by Zenna Elfen on 2025/11/27 12:02

Definitions for Authentication and Access

FunctionWhat it means in P2P context
PermissionsDefine what actions a peer is allowed to perform (read, write, broadcast, modify state, etc.)
DelegationAllow a peer to grant some portion of its authority to another peer (e.g., "you can write to this dataset for 1 day")
CapabilitiesTokens/objects that embody permissions and can be passed around securely
RevocationAbility to withdraw access (essential yet tricky, since there's no central admin)
Identity-agnostic controlOften operations are authorized not by who you are but what capabilities you possess

Definitions for Security and Encryption

Security FunctionPurposeExamples
Transport EncryptionP2P channel confidentialityTLS, Noise
Private Interest Overlapallows peers to securely determine if they have capabilities in common without revealing what those capabilities areWillow
Message EncryptionEnd-to-end secrecy, asyncMLS, Olm/Megolm, DR
Identity & TrustWho’s who, key bootstrappingDIDs, TOFU, Web-of-trust
IntegrityDetect tamperingAEAD, Merkle DAGs
Key LifecycleRotation, revocation, recoveryX3DH, key transparency
Anonymity & Metadata ProtectionHide who communicates with whomTor, mixnets
Anti-Abuse / Sybil ResistanceResist spam and capturePoW, stake, identity proofs
Censorship ResistanceSurvive blocking, surveillancepluggable transports, relays
Secure StorageProtect data at resthardware keystores, secret sharing
Integrated OverlaysAll of the above in one stackVeilid, I2P, Nym
ConfidentialityOnly intended peers can read communicationTLS, DTLS, Noise Protocol Framework, AEAD (e.g., ChaCha20-Poly1305), MLS, Olm/Megolm, WireGuard, Veilid E2E channels
IntegrityMessages can't be modified undetectedDigital signatures (Ed25519, BLS), MACs, Merkle DAGs (IPLD/IPFS), Hash chains, Signed Gossip, BPSec
AuthenticationVerify identity or cryptographic key ownershipNoise handshake patterns, TLS mutual auth, DIDs, Web-of-Trust (PGP), TOFU (SSH-style), libp2p PeerIDs, X3DH (Signal)
Forward SecrecyCompromising long-term keys does not reveal past messagesDouble Ratchet, X3DH, MLS TreeKEM, Noise ephemeral handshakes, Olm (Matrix)
Metadata protectionHide sender, receiver, and communication patternsTor (Onion routing), Mixnets (Katzenpost / Nym), Dandelion++ (P2P routing privacy), Cover traffic schemes, Veilid routing obfuscation
ResilienceContinue operating despite adversarial environmentsMultipath routing (Tor bridges, libp2p relay), Censorship-resistant transports (Snowflake, Pluggable transports), DTN/BPSec, CRDT/replicated DHT storage (IPFS/Kademlia), Opportunistic mesh routing (Briar/Scuttlebutt), Veilid global overlay network