Secure random number agreement for peer-to-peer applications

被引:0
|
作者
Corman, Amy Beth [1 ]
Schachte, Peter [1 ]
Teague, Vanessa [2 ]
机构
[1] Univ Melbourne, Natl ICT Australia, Melbourne, Vic 3010, Australia
[2] Univ Melbourne, Dept Comp Sci & Software Engn, Melbourne, Vic, Australia
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We propose a protocol for a group of peers in a peer-to-peer network to securely generate an agreed random value without the use of a central authority. We can vary the security parameters to maintain security (to a desired probability) in the presence of a high percentage of corrupt and colluding peers. We envision using this protocol to generate random content in a peer-to-peer game. It could also be used for generating input into peer-to-peer protocols that require random values, such as group selection.
引用
收藏
页码:563 / +
页数:3
相关论文
共 50 条
  • [1] A Secure Event Agreement (SEA) protocol for peer-to-peer games
    Corman, Amy Beth
    Douglas, Scott
    Schachte, Peter
    Teague, Vanessa
    FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 34 - +
  • [2] PeerMint: Decentralized and secure accounting for peer-to-peer applications
    Hausheer, D
    Stiller, B
    NETWORKING 2005: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS SYSTEMS, 2005, 3462 : 40 - 52
  • [3] Robust random number generation for peer-to-peer systems
    Awerbuch, Baruch
    Scheideler, Christian
    PRINCIPLES OF DISTRIBUTED SYSTEMS, PROCEEDINGS, 2006, 4305 : 275 - 289
  • [4] Robust random number generation for peer-to-peer systems
    Awerbuch, Baruch
    Scheideler, Christian
    THEORETICAL COMPUTER SCIENCE, 2009, 410 (6-7) : 453 - 466
  • [5] Random Linear Network Coding for Peer-to-Peer Applications
    Chu, Xiaowen
    Jiang, Yixin
    IEEE NETWORK, 2010, 24 (04): : 35 - 39
  • [6] Rhubarb: a tool for developing scalable and secure peer-to-peer applications
    Wierzbicki, A
    Strzelecki, R
    Swierczewski, D
    Znojek, M
    SECOND INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2002, : 144 - 151
  • [7] A Peer-to-Peer Secure VoIP Architecture
    Cirani, Simone
    Pecori, Riccardo
    Veltri, Luca
    TRUSTWORTHY INTERNET, 2011, : 105 - 115
  • [8] DisCO: Peer-to-Peer Random Number Generator in Partial Synchronous Systems
    Krasnoselskii, Mikhail
    Melnikov, Grigorii
    Yanovich, Yury
    2021 3RD CONFERENCE ON BLOCKCHAIN RESEARCH & APPLICATIONS FOR INNOVATIVE NETWORKS AND SERVICES (BRAINS), 2021, : 157 - 164
  • [9] Implementation of secure peer group in peer-to-peer network
    Li, ZP
    Dong, YG
    Zhuang, L
    Huang, JH
    2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 192 - 195
  • [10] A definition of Peer-to-Peer networking for the classification of Peer-to-Peer architectures and applications
    Schollmeier, R
    FIRST INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, 2002, : 101 - 102