Loading…

An authentication protocol without trusted third party on P2P network

A CLK-Based secure authentication protocol is proposed which provides the anonymity and the ability to store data securely. The trusted third party (key information center) is not needed when the secure network system is set up. The protocol avoids the escrow problem inidentity-based cryptosystem an...

Full description

Saved in:
Bibliographic Details
Main Authors: Yonghong Zhou, Huaiqing Lin
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:A CLK-Based secure authentication protocol is proposed which provides the anonymity and the ability to store data securely. The trusted third party (key information center) is not needed when the secure network system is set up. The protocol avoids the escrow problem inidentity-based cryptosystem and the secure delivery of private keys. The security of protocol is based on some underlying problems closely related to the Computational Diffie-Hellman Problem and Bilinear Diffie-Hellman Problem are computationally hard. The protocol is studied for a model P2P storage system that needs to implement file access rights.
DOI:10.1109/ICFCC.2010.5497580