P2P authentication based on durable P2P storage technique

被引:0
|
作者
Wen, Tao [1 ]
Zhang, Yong [1 ]
Guo, Quan [1 ]
Li, Ying-Qiu [1 ]
机构
[1] Software Center, Northeastern University, Shenyang 110004, China
关键词
Peer to peer networks;
D O I
暂无
中图分类号
学科分类号
摘要
Analyzing the security, easy-to-use operation and cost of authentication, introducing the password-based authentication into a P2P system is regarded as necessary. With the durable P2P storage techniques and the ideas about reliable computation and virtual system taken into account to provide a decentralized database for storing users' information and reliable entity for authentication, the two key problems using durable techniques of password-based identity authentication can be solved, i.e., a user's individual information is unable to store and lack of objectively reliable entity for implementing the password-based authentication. The theoretical analysis and prototype both verify the feasibility of the way proposed for authentication, which is a try beneficial to the improvement of authentication.
引用
下载
收藏
页码:1381 / 1384
相关论文
共 50 条
  • [31] The power of P2P
    Delaney, B.
    Catarci, T.
    Little, T.D.C.
    IEEE Multimedia, 2001, 8 (02) : 100 - 103
  • [32] 掘金P2P
    孙柏
    金融博览(财富), 2014, (06) : 43 - 45
  • [33] P2P屠城
    张弘
    中国企业家, 2018, (15) : 53 - 56
  • [34] 漫话P2P
    老马
    小康(财智), 2016, (05) : 66 - 69
  • [36] P2P沉浮
    陈怡璇
    上海国资, 2015, (03) : 42 - 44
  • [37] 再见,P2P
    曹巍嵩
    理财, 2020, (02) : 58 - 59
  • [38] P2P“裸奔”
    本刊编辑部
    王祥胜
    魏冬
    崔彬彬
    沈谦
    喻越
    于秀
    岳明
    理财, 2013, (01) : 15 - 15
  • [39] P2P技术
    赵宝艳
    电信工程技术与标准化, 2007, (04) : 77 - 79