DocumentCode :
3065430
Title :
Authentication with controlled anonymity in P2P systems
Author :
Wierzbicki, Adam ; Zwierko, Aneta ; Kotulski, Zbigniew
Author_Institution :
Polish-Japanese Institute of Information Technology Warsaw, Poland
fYear :
2005
fDate :
05-08 Dec. 2005
Firstpage :
871
Lastpage :
875
Abstract :
This paper describes a new protocol for authentication in Peer-to-Peer systems. The protocol has been designed to meet specialized requirements of P2P systems, such as lack of direct communication between peers or requirements for controlled anonymity. At the same time, a P2P authentication protocol must be resistant to spoofing, eavesdropping and playback, and man-in-the-middle attacks. The protocol is studied for a model P2P storage system that needs to implement file access rights.
Keywords :
Access protocols; Authentication; Communication system control; Control systems; Cryptographic protocols; Information technology; Peer to peer computing; Permission; Public key cryptography; Telecommunication control;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Parallel and Distributed Computing, Applications and Technologies, 2005. PDCAT 2005. Sixth International Conference on
Print_ISBN :
0-7695-2405-2
Type :
conf
DOI :
10.1109/PDCAT.2005.95
Filename :
1579051
Link To Document :
بازگشت