Framework for secure authentication of nodes in peer-to-peer network | |
Zhou Zhou ; Huang Yongfeng ; Li Xing | |
2010-05-06 ; 2010-05-06 | |
关键词 | Practical/ message authentication peer-to-peer computing protocols public key cryptography/ secure authentication peer-to-peer network central identity-code assignment trusted third party trust model secure dynamic accumulator public key infrastructure distributed authentication protocols/ B6210L Computer communications B6120D Cryptography B6150M Protocols C5620 Computer networks and techniques C6150N Distributed systems software C6130S Data security C5640 Protocols |
中文摘要 | A novel authentication framework, which is named central identity-code assignment and distributed authentication (CIADA) , is proposed in order to meet the demands of the secure authentication for nodes in the peer-to-peer (P2P) network. The "trusted third party" (TTP) trust model is improved, and the secure dynamic accumulator is utilized to carry out the authentication protocol. The authentication among nodes is implemented efficiently. The dynamic entering or leaving of nodes is supported, and the authentication among domains and the combination of domains are allowed. CIADA takes full account of the characters of P2P network such as self-organization, dynamic and scalability. It is in the same secure intension as public key infrastructure (PKI) but without the defects in keys' issue and revoking and the authentication among domains of other existed distributed authentication protocols. So CIADA is more suitable for the secure authentication of nodes in the P2P network. |
语种 | 中文 ; 中文 |
出版者 | Southeast University ; China |
内容类型 | 期刊论文 |
源URL | [http://hdl.handle.net/123456789/12003] |
专题 | 清华大学 |
推荐引用方式 GB/T 7714 | Zhou Zhou,Huang Yongfeng,Li Xing. Framework for secure authentication of nodes in peer-to-peer network[J],2010, 2010. |
APA | Zhou Zhou,Huang Yongfeng,&Li Xing.(2010).Framework for secure authentication of nodes in peer-to-peer network.. |
MLA | Zhou Zhou,et al."Framework for secure authentication of nodes in peer-to-peer network".(2010). |
个性服务 |
查看访问统计 |
相关权益政策 |
暂无数据 |
收藏/分享 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论