Title :
An authentication protocol without trusted third party on P2P network
Author :
Zhou, Yonghong ; Lin, Huaiqing
Author_Institution :
Electr. & Inf. Eng. Coll., Naval Univ. of Eng., Wuhan, China
Abstract :
A CLK-Based secure authentication protocol is proposed which provides the anonymity and the ability to store data securely. The trusted third party (key information center) is not needed when the secure network system is set up. The protocol avoids the escrow problem inidentity-based cryptosystem and the secure delivery of private keys. The security of protocol is based on some underlying problems closely related to the Computational Diffie-Hellman Problem and Bilinear Diffie-Hellman Problem are computationally hard. The protocol is studied for a model P2P storage system that needs to implement file access rights.
Keywords :
peer-to-peer computing; private key cryptography; protocols; CLK-based secure authentication protocol; P2P network; bilinear Diffie-Hellman problem; computational Diffie-Hellman problem; data security; inidentity-based cryptosystem; private keys; trusted third party; Access protocols; Authentication; Cryptographic protocols; Data engineering; Data security; Educational institutions; Identity-based encryption; Information security; Public key; Public key cryptography; Anonymity; Authentication; CL-PKC; P2P;
Conference_Titel :
Future Computer and Communication (ICFCC), 2010 2nd International Conference on
Conference_Location :
Wuhan
Print_ISBN :
978-1-4244-5821-9
DOI :
10.1109/ICFCC.2010.5497580