Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems

被引:20
作者
Butler, Kevin R. B. [1 ]
Ryu, Sunam [2 ]
Traynor, Patrick [3 ]
McDaniel, Patrick D. [1 ]
机构
[1] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
[2] Def Secur Command, Gwacheon Si, Gyeonggi Do, South Korea
[3] Georgia Inst Technol, Sch Comp Sci, Atlanta, GA 30332 USA
关键词
Network protocols; peer-to-peer; distributed systems; cryptographic controls;
D O I
10.1109/TPDS.2008.249
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Structured peer-to-peer (P2P) systems have grown enormously because of their scalability, efficiency, and reliability. These systems assign a unique identifier to each user and object. However, current assignment schemes allow an adversary to carefully select user IDs and/or simultaneously obtain many pseudo-identities-ultimately leading to an ability to disrupt the P2P system in very targeted and dangerous ways. In this paper, we propose novel ID assignment protocols based on identity-based cryptography. This approach permits the acquisition of node IDs to be tightly regulated without many of the complexities and costs associated with traditional certificate solutions. We broadly consider the security requirements of ID assignment and present three protocols representing distinct threat and trust models. A detailed empirical study of the protocols is given. Our analysis shows that the cost of our identity-based protocols is nominal, and that the associated identity services can scale to millions of users using a limited number of servers.
引用
收藏
页码:1803 / 1815
页数:13
相关论文
共 44 条
[1]  
[Anonymous], 2002, P 1 INT WORKSH PEER
[2]  
[Anonymous], 2007, PBC LIB
[3]  
[Anonymous], 2004, P ANN C USENIX ANN T
[4]  
[Anonymous], P 2001 C APPL TECHN, DOI DOI 10.1145/383059.383071
[5]  
BASET SA, 2006, P IEEE INFOCOM 06 AP
[6]  
Bellare P., 1993, P 1 ACM C COMP COMM, P62, DOI DOI 10.1145/168588.168596
[7]   Hierarchical identity based encryption with constant size ciphertext [J].
Boneh, D ;
Boyen, X ;
Goh, EJ .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 :440-456
[8]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[9]   Computational puzzles as Sybil defenses [J].
Borisov, Nikita .
SIXTH IEEE INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2006, :171-176
[10]  
Canetti R., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P209, DOI 10.1145/276698.276741