Securing Key Issuing in Peer-to-peer Networks.
Cong Tang,Ruichuan Chen,Zhuhua Cai,Anmin Xie,Jian-bin Hu,Liyong Tang,Zhong Chen
DOI: https://doi.org/10.1145/1529282.1529298
2009-01-01
Abstract:Compared with the public key infrastructure (PKI) technique, identity based cryptography (IBC) can simplify the key management process in peer-to-peer (P2P) networks significantly. The identity of a peer (e.g., peer identifier or peer geometric coordinate) in P2P overlay networks is used to create its public key, thus avoiding the use of any certificates. These IBC-based systems are scalable, simple to administer, and each user can carry out anytime/anywhere encryption, establish secure communication channels, prove its identity to other nodes, verify protected messages and produce a form of signature with non-repudiation properties.