浏览全部资源
扫码关注微信
纸质出版日期:2012,
网络出版日期:2012-5-21,
扫 描 看 全 文
杨邓奇,陈兴蜀,左国超.分布式结构化P2P系统可靠节点ID分配研究[J].工程科学与技术,2012,44(4):129-134.
Reliable Node ID Assignment for Distributed Structured P2P Systems[J]. Advanced Engineering Sciences, 2012,44(4):129-134.
中文摘要: 当前的结构化P2P系统节点ID分配方案存在以下问题:1)对节点ID的安全需求缺乏全面的分析,主要以解决Sybil攻击问为目标;2)需要进行复杂的CA证书管理或存在密钥托管问题;3)要求系统中有中心服务器或可信的第三方,不能在分布式的结构化P2P环境采用。首先确定可靠ID分配方案的目标,并基于秘密共享和无证书密码技术设计无可信中心的无证书签名方案。在此基础上,设计分布式结构化P2P系统可靠ID分配协议。该协议适用于无可信中心的分布式结构化P2P环境,避免了上述存在的3个问题。分析表明,该协议具有安全性强、效率高、扩展性好等特性。
Abstract:The goal of node ID assignment scheme was set firstly
and a non-certificate signature scheme without trusted third party was proposed based secret sharing and non-certificate cryptography without paring. Based on that
a reliable node ID assignment protocol was presented for distributed structured P2P systems. Analysis showed that this protocol is more secure
efficient and scalable than the conventional ones.
秘密共享技术无可信中心的无证书签名可靠节点ID分配
secret sharingnon-certificate signature without trusted centerreliable node ID assignment
Yu J,Fang C,Xu J,ID repetition in Kad,USA,IEEE,2009.
Hadlee N A,Kayalvizhi S,Increasing sybil attack detection probability in open-access distributed systems,India,IEEE,2011.
Yue Xiaowen,Qiu Xiaofeng,P2P attack taxonomy and rela- tionship analysis,Korea,IEEE,2009.
Yang Dengqi,Chen Xingshu,Wang Jian,Security architec- ture for P2P app!ications,JDCTA,2011(11).
Rowaihy H,Enck W,McDanie P,Limiting sybil attacks in structured P2P networks,USA,IEEE,2007.
Borisov N,Computational puzzles as sybil defenses,United Kingdom,IEEE,2006.
Tran Nguyen,Li Jinyang,Optimal sybil-resilient node admis- sion control,China:IEEE,2011.
Lesueur F,Me L,Tong V,A sybil-resistant admission control coupling sybilGuard with distributed certification,Italy,IEEE,2008.
Butler K,Ryu S,Traynor P,Leveraging identity-based cryptography for node ID assignment in structured P2P sys- tems,IEEE Transactions on Parallel and Distributed Sys- tems,2009(12).
RyuS,Butler K,Traynor P,Leveraging identity-based cryptography for node ID assignment in structured P2P sys- tems,Canada,IEEE,2007.
Boneh D,Franklin M K,Identity-based encryption from the weil pairing,USA,IEEE,2001.
A1-RiyamiI S S,Pateraon K G,Certificatelesspublickey cryptography,Beilin:Springer-Verlag,2003.
Yang D Q,Chen X S,Wang J,A P2P reference model,China Communications,2010(4).
Chen L,Cheng Z,Smart N P,Identity-based key agreement protocols from pairings,Int J Inf Secur,2007(4).
李方伟,移动通信系统认证协议与密码技术,北慕:人民邮电出版社,2007.
0
浏览量
2
下载量
0
CNKI被引量
关联资源
相关文章
相关作者
相关机构