Peer-to-Peer (P2P) communication model has the potential to harness huge amounts of resources. However, due to the self-organizing and self-maintaining nature, current P2P networks suffer from various kinds of attacks. Public key authentication can provide a fundamental building block for P2P communication security. In this paper, we propose a scalable Byzantine fault tolerant public key authentication scheme for P2P networks, in which each participating peer dynamically maintains a trusted group to perform distributed challenge-response anthentication without centralized infrastructure. To guarantee the authentication correctness, we additionally present a complementary trusted group maintenance scheme. The experimental results demonstrate...
International audienceIn decentralized P2P networks, many security mechanisms still rely on a centra...
We have developed a practical state-machine replication algorithm that tolerates Byzantine faults: i...
Peer-to-peer systems let users share information in distributed environments because of their scalab...
A Byzantine fault tolerant public key infrastructure is presented. It aims to fulfill the authentica...
Abstract: Recently P2P networks become more and more popular. Though they have many advantages, P2P ...
Abstract. One of the main advantages of peer-to-peer (P2P) systems is their capability to offer repl...
Authentication has traditionally been done either in a decentralized manner with human assistance or...
Identity based cryptography (IBC) was introduced into peer-to-peer (P2P) networks recently for ident...
Public key infrastructure (PKI) is a powerful tool for protecting information. Currently a PKI syste...
Despite the advantages offered by pure Peer to Peer (P2P) networks (e.g. robustness and fault tolera...
14 pages, 8 figures.-- A preliminary version of this work appeared in the Proceedings of the 6th Int...
Abstract: Key issuing scheme focuses on the confidentiality maintained in using the secret key for c...
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolera...
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolera...
International audienceIn decentralized P2P networks, many security mechanisms still rely on a centra...
International audienceIn decentralized P2P networks, many security mechanisms still rely on a centra...
We have developed a practical state-machine replication algorithm that tolerates Byzantine faults: i...
Peer-to-peer systems let users share information in distributed environments because of their scalab...
A Byzantine fault tolerant public key infrastructure is presented. It aims to fulfill the authentica...
Abstract: Recently P2P networks become more and more popular. Though they have many advantages, P2P ...
Abstract. One of the main advantages of peer-to-peer (P2P) systems is their capability to offer repl...
Authentication has traditionally been done either in a decentralized manner with human assistance or...
Identity based cryptography (IBC) was introduced into peer-to-peer (P2P) networks recently for ident...
Public key infrastructure (PKI) is a powerful tool for protecting information. Currently a PKI syste...
Despite the advantages offered by pure Peer to Peer (P2P) networks (e.g. robustness and fault tolera...
14 pages, 8 figures.-- A preliminary version of this work appeared in the Proceedings of the 6th Int...
Abstract: Key issuing scheme focuses on the confidentiality maintained in using the secret key for c...
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolera...
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolera...
International audienceIn decentralized P2P networks, many security mechanisms still rely on a centra...
International audienceIn decentralized P2P networks, many security mechanisms still rely on a centra...
We have developed a practical state-machine replication algorithm that tolerates Byzantine faults: i...
Peer-to-peer systems let users share information in distributed environments because of their scalab...