Scalable Byzantine Fault Tolerant Public Key Authentication for Peer-to-Peer Networks

  • Authors:
  • Ruichuan Chen;Wenjia Guo;Liyong Tang;Jianbin Hu;Zhong Chen

  • Affiliations:
  • Institute of Software, School of Electronics Engineering and Computer Science, Peking University, China and Key Laboratory of High Confidence Software Technologies (Peking University), Ministry of ...;Institute of Software, School of Electronics Engineering and Computer Science, Peking University, China and Key Laboratory of High Confidence Software Technologies (Peking University), Ministry of ...;Institute of Software, School of Electronics Engineering and Computer Science, Peking University, China and Key Laboratory of High Confidence Software Technologies (Peking University), Ministry of ...;Institute of Software, School of Electronics Engineering and Computer Science, Peking University, China and Key Laboratory of High Confidence Software Technologies (Peking University), Ministry of ...;Institute of Software, School of Electronics Engineering and Computer Science, Peking University, China and Key Laboratory of High Confidence Software Technologies (Peking University), Ministry of ...

  • Venue:
  • Euro-Par '08 Proceedings of the 14th international Euro-Par conference on Parallel Processing
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Peer-to-Peer (P2P) communication model has the potential to harness huge amounts of resources. However, due to the self-organizing and self-maintaining nature, current P2P networks suffer from various kinds of attacks. Public key authentication can provide a fundamental building block for P2P communication security. In this paper, we propose a scalable Byzantine fault tolerant public key authentication scheme for P2P networks, in which each participating peer dynamically maintains a trusted group to perform distributed challenge-response authentication without centralized infrastructure. To guarantee the authentication correctness, we additionally present a complementary trusted group maintenance scheme. The experimental results demonstrate that our authentication scheme can work in various different P2P scenarios effectively and efficiently.