Title :
Authentication with controlled anonymity in P2P systems
Author :
Wierzbicki, Adam ; Zwierko, Aneta ; Kotulski, Zbigniew
Author_Institution :
Polish-Japanese Institute of Information Technology Warsaw, Poland
Abstract :
This paper describes a new protocol for authentication in Peer-to-Peer systems. The protocol has been designed to meet specialized requirements of P2P systems, such as lack of direct communication between peers or requirements for controlled anonymity. At the same time, a P2P authentication protocol must be resistant to spoofing, eavesdropping and playback, and man-in-the-middle attacks. The protocol is studied for a model P2P storage system that needs to implement file access rights.
Keywords :
Access protocols; Authentication; Communication system control; Control systems; Cryptographic protocols; Information technology; Peer to peer computing; Permission; Public key cryptography; Telecommunication control;
Conference_Titel :
Parallel and Distributed Computing, Applications and Technologies, 2005. PDCAT 2005. Sixth International Conference on
Print_ISBN :
0-7695-2405-2
DOI :
10.1109/PDCAT.2005.95