Securing key issuing in peer-to-peer networks

  • Authors:
  • Cong Tang;Ruichuan Chen;Zhuhua Cai;Anmin Xie;Jianbin Hu;Liyong Tang;Zhong Chen

  • Affiliations:
  • Peking University, China;Peking University, China;Peking University, China;Peking University, China;Peking University, China;Peking University, China;Peking University, China

  • Venue:
  • Proceedings of the 2009 ACM symposium on Applied Computing
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Compared with the public key infrastructure (PKI) technique, identity based cryptography (IBC) can simplify the key management process in peer-to-peer (P2P) networks significantly. The identity of a peer (e.g., peer identifier or peer geometric coordinate) in P2P overlay networks is used to create its public key, thus avoiding the use of any certificates. These IBC-based systems are scalable, simple to administer, and each user can carry out anytime/anywhere encryption, establish secure communication channels, prove its identity to other nodes, verify protected messages and produce a form of signature with non-repudiation properties.