Chord-PKI: Embedding a public key infrastructure into the chord overlay network

被引:0
作者
Avramidis, Agapios [1 ]
Kotzanikolaou, Panayiotis [1 ]
Douligeris, Christos [1 ]
机构
[1] Univ Piraeus, Dept Informat, Karaoli & Dimitriou 80, Piraeus 18534, Greece
来源
PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS | 2007年 / 4582卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Our goal in this paper is to provide authentication, encryption and non-repudiation services for nodes within Peer-to-Peer networks, in an efficient and scalable way. To accomplish this, we propose a distributed Public Key Infrastructure model, suitable for Peer-to-Peer networks and more particularly for the Chord protocol. Our solution integrates the PKI infrastructure within the Chord architecture. We use well known cryptographic techniques as building blocks, such as threshold cryptography and proactive updating.
引用
收藏
页码:354 / +
页数:3
相关论文
共 16 条
[1]  
BRAMPTON A, 2005, CONEXT05 P 2005 ACM, P230, DOI DOI 10.1145/10959321.1095955
[2]   Secure routing for structured peer-to-peer overlay networks [J].
Castro, M ;
Druschel, P ;
Ganesh, A ;
Rowstron, A ;
Wallach, DS .
USENIX ASSOCIATION PROCEEDINGS OF THE FIFTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, 2002, :299-314
[3]   Beyond "web of trust": Enabling P2P e-commerce* [J].
Datta, A ;
Hauswirth, M ;
Aberer, K .
IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE, 2003, :303-312
[4]  
Desmedt Y, 1997, Tech Rep. ISSE-TR-97-01
[5]  
DESMEDT Y, 1993, CRYPTO 1989 LNCS, V435
[6]  
Heinbockel W, 2005, 2005 FIRST WORKSHOP ON SECURE NETWORK PROTOCOLS (NPSEC), P43
[7]  
Herzberg A., 1997, P 4 ACM C COMPUTER C, P100
[8]  
KAMVAR SD, 2003, WWW 03, P640, DOI DOI 10.1145/775152.775242
[9]  
RATNASAMY S, 2001, ACM SIGCOMM, P161
[10]  
RISSON J, 2006, ELSEVIER COMPUTER NE, V50, P3495