Message Security in P2P Network Using Distributed Private Key

被引:0
|
作者
Patil, Pankaj R.
Patil, D. R.
机构
关键词
Cryptography; Identity-base cryptography; Peer-to-Peer; PKI; KADEMLIA;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Peers are equally privileged, equipotent participants in the application. Identity based cryptography (IBC) was introduced into peer-to-peer networks recently for identity verification and authentication purposes. In this paper we use a method that will provide the security issues for private key with efficient and secure protocol for key issuing in ID-based cryptosystems. We use a simple blinding technique to eliminate the need of secure channel and also multiple authorities approach to avoid the key distribution problem. We also show the experimental results conducted on key distribution and peer registration protocol.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Distributed Approach for the Security of P2P Wireless Network
    Yin, Chunyong
    Stacey, Nimenya
    Beita, Tatiana Moreira
    Wang, Jin
    [J]. ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2018, 474 : 915 - 919
  • [2] Distributed message routing in unstructured P2P network overlays
    Ciglaric, M
    Pancur, M
    Trampus, M
    Vidmar, T
    [J]. IEEE REGION 8 EUROCON 2003, VOL B, PROCEEDINGS: COMPUTER AS A TOOL, 2003, : 79 - 82
  • [3] Increasing security of P2P network by protectingprivate key of TTP
    Cao Laicheng
    [J]. 2005 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND TECHNOLOGY, PROCEEDINGS, 2005, : 429 - 434
  • [4] Network Security Technology in P2P
    Zhang, Pengwei
    Jiao, Xiaojing
    Zhou, Ruijin
    [J]. ADVANCED RESEARCH ON COMPUTER SCIENCE AND INFORMATION ENGINEERING, 2011, 153 : 145 - 149
  • [5] Scalable Private P2P network for distributed and Hierarchical Machine Learning in VANETs
    Jeon, Jeong Min
    Hong, Choong Seon
    [J]. 35TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2021), 2021, : 627 - 629
  • [6] A Network Model of P2P Extending to Private Network
    Wang, Wenhao
    Zhou, Miao
    [J]. APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 2464 - 2467
  • [7] A distributed key management scheme based on SGC-PKC for P2P network
    Jiang, Hua
    Jia, Yongxing
    Zhang, Rui
    Liu, Shanming
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 491 - +
  • [8] Distributed P2P network model based on active network
    Huang, Dao-Ying
    Huang, Jian-Hua
    Zhuang, Lei
    Li, Zu-Peng
    [J]. Ruan Jian Xue Bao/Journal of Software, 2004, 15 (07): : 1081 - 1089
  • [9] Distributed network file storage for a serverless (P2P) network
    Ye, W
    Khan, AI
    Kendall, EA
    [J]. ICON 2003: 11TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, 2003, : 343 - 347
  • [10] A P2P E-commerce Related Network Security Issue: P2P Worm
    Zhang, Yejiang
    Li, Zhitang
    Hu, Zhengbing
    Tu, Hao
    Lin, Huaiqing
    [J]. PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 114 - 117