1 / 8

Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems

Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems. Authors: Kevin R.B. Butler, Sunam Ryu, Patrick Traynor, and Patrick D. McDaniel Source: IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. X, XXX, 2009 Speaker: Shu-Fen Chiou ( 邱淑芬 ).

reed
Download Presentation

Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems Authors: Kevin R.B. Butler, Sunam Ryu, Patrick Traynor, and Patrick D. McDaniel Source: IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. X, XXX, 2009 Speaker: Shu-Fen Chiou (邱淑芬)

  2. 要解決的問題 • Secure key assignment • Authentication P2 N P3 new user P1 TP P4 BN P5

  3. Requirements • Structure P2P network • Secure ID assignment • Without certificate • Sybil attack mitigation • Anonymity • Limited overhead • Simplicity

  4. Trusted Third Party TP: Third Party BN: Bootstrap Node N: new node N O: other nodes in network {IPN} {IDN, EKTP-N(SKN)} {IDN, TS1, SignSKN(IDN||TS1)} {IDN, TS1, SignSKBN(IDN||TS1)} {SignSKBN(IDN||TS1)}

  5. Trusted Bootstrap Node • Single host plays the role of both ID authority and bootstrap node. {IPN} {IDN, EKBN-N(SKN), TS1, SignSKBN(IDN||TS1)} {IDN, TS1, SignSKBN(IDN||TS1)}

  6. Trusted Assignor Node • In order to reduce the cost. Assignor by BN {IPN} {IDN, TS1, HMACKAS-BN(IDN||TS1)} {IDN, TS1, HMACKAS-BN(IDN||TS1)} {IDN, TS2, SignSKBN (IDN||TS1)} *HMAC: keyed-Hash Massage Authentication Code {EKBN-N(SKN), TS2, SignSKBN (IDN||TS1)}

  7. Comments • 優點: • Low cost and overhead in P2P network • Simple protocols • A lot of evaluations and discussions • Five evaluations • Six subjects in discussion • 缺點: • Only using the methods which have been proposed. • 未來可能研究方向 • A novel protocol in the hybrid P2P network by modified their protocols.

  8. Comments • Hybrid P2P network SP SP: Super node

More Related