Secure random number agreement for peer-to-peer applications

被引:0
|
作者
Corman, Amy Beth [1 ]
Schachte, Peter [1 ]
Teague, Vanessa [2 ]
机构
[1] Univ Melbourne, Natl ICT Australia, Melbourne, Vic 3010, Australia
[2] Univ Melbourne, Dept Comp Sci & Software Engn, Melbourne, Vic, Australia
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We propose a protocol for a group of peers in a peer-to-peer network to securely generate an agreed random value without the use of a central authority. We can vary the security parameters to maintain security (to a desired probability) in the presence of a high percentage of corrupt and colluding peers. We envision using this protocol to generate random content in a peer-to-peer game. It could also be used for generating input into peer-to-peer protocols that require random values, such as group selection.
引用
收藏
页码:563 / +
页数:3
相关论文
共 50 条
  • [41] An efficient and secure code sharing for Peer-to-Peer communications
    Wu, Wei
    Le, Phu Dung
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, PROCEEDINGS, 2006, : 476 - +
  • [42] Scalable and secure peer-to-peer systems with support for QoS
    Shukla, J
    FIRST INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, 2002, : 47 - 47
  • [43] Construct Secure Regions Jointed Peer-to-Peer Networks
    Liu, Xiaojun
    Deng, Zhiqun
    EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5027 - +
  • [44] A peer-to-peer architecture for secure data storage with query
    Marceau, C
    Hanna, J
    McCullough, D
    Popli, A
    Stillerman, M
    Defense Transformation and Network-Centric Systems, 2005, 5820 : 243 - 254
  • [45] Secure routing for structured peer-to-peer overlay networks
    Castro, M
    Druschel, P
    Ganesh, A
    Rowstron, A
    Wallach, DS
    USENIX ASSOCIATION PROCEEDINGS OF THE FIFTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, 2002, : 299 - 314
  • [46] Secure peer-to-peer learning using feature embeddings
    Kasturi, Anirudh
    Agrawal, Akshat
    Hota, Chittaranjan
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (03): : 3471 - 3479
  • [47] Peer-to-Peer Secure Updates for Heterogeneous Edge Devices
    Herry, Herry
    Band, Emily
    Perkins, Colin
    Singer, Jeremy
    NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [48] Placement in dependable and secure peer-to-peer data grids
    Tu, Manghui
    Xiao, Liangliang
    Ma, Hui
    HASE 2007: 10TH IEEE HIGH ASSURANCE SYSTEMS ENGINEERING SYMPOSIUM, PROCEEDINGS, 2007, : 133 - +
  • [49] Secure peer-to-peer 3D streaming
    Chan, Mo-Che
    Hu, Shun-Yun
    Jiang, Jehn-Ruey
    MULTIMEDIA TOOLS AND APPLICATIONS, 2009, 45 (1-3) : 369 - 384
  • [50] PGSP: A protocol for secure communication in peer-to-peer system
    Arora, N
    Shyamasundar, RK
    2005 IEEE Wireless Communications and Networking Conference, Vols 1-4: WCNC 2005: BROADBAND WIRELESS FOR THE MASSES READY FOR TAKE-OFF., 2005, : 2094 - 2099