80 likes | 232 Views
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems. Authors: Kevin R.B. Butler, Sunam Ryu, Patrick Traynor, and Patrick D. McDaniel Source: IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. X, XXX, 2009 Speaker: Shu-Fen Chiou ( 邱淑芬 ).
E N D
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems Authors: Kevin R.B. Butler, Sunam Ryu, Patrick Traynor, and Patrick D. McDaniel Source: IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. X, XXX, 2009 Speaker: Shu-Fen Chiou (邱淑芬)
要解決的問題 • Secure key assignment • Authentication P2 N P3 new user P1 TP P4 BN P5
Requirements • Structure P2P network • Secure ID assignment • Without certificate • Sybil attack mitigation • Anonymity • Limited overhead • Simplicity
Trusted Third Party TP: Third Party BN: Bootstrap Node N: new node N O: other nodes in network {IPN} {IDN, EKTP-N(SKN)} {IDN, TS1, SignSKN(IDN||TS1)} {IDN, TS1, SignSKBN(IDN||TS1)} {SignSKBN(IDN||TS1)}
Trusted Bootstrap Node • Single host plays the role of both ID authority and bootstrap node. {IPN} {IDN, EKBN-N(SKN), TS1, SignSKBN(IDN||TS1)} {IDN, TS1, SignSKBN(IDN||TS1)}
Trusted Assignor Node • In order to reduce the cost. Assignor by BN {IPN} {IDN, TS1, HMACKAS-BN(IDN||TS1)} {IDN, TS1, HMACKAS-BN(IDN||TS1)} {IDN, TS2, SignSKBN (IDN||TS1)} *HMAC: keyed-Hash Massage Authentication Code {EKBN-N(SKN), TS2, SignSKBN (IDN||TS1)}
Comments • 優點: • Low cost and overhead in P2P network • Simple protocols • A lot of evaluations and discussions • Five evaluations • Six subjects in discussion • 缺點: • Only using the methods which have been proposed. • 未來可能研究方向 • A novel protocol in the hybrid P2P network by modified their protocols.
Comments • Hybrid P2P network SP SP: Super node