Distributed Key Management Scheme Based on CL-PKC in P2P Networks

P2P networks have characteristics of decentralization, autonomy, and dynamicity. The security problems caused by these characteristics have seriously affected further development of P2P networks. The authors did research on CL-PKC key management schemes. (1) They propose a certificateless-based key distribution scheme with multiple trusted centers that fits the characteristics of P2P networks, and analyzed its security. (2) They also propose an improved interactive key agreement protocol across multiple domains, and then compare it with some existing key agreement protocol from aspects of security and computational efficiency. (3) The authors have implemented the proposed key management schemes, then verified their correctness and tested their computational efficiency. Combined with master key share management and key management of nodes, this system constructed a complete certificateless-based key management model, which is an exploration to solve security problems in P2P networks. DOI: 10.4018/978-1-4666-0978-5.ch012

[1]  Baruch Awerbuch,et al.  Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).

[2]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[3]  Paul Feldman,et al.  A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).

[4]  Hamid R. Nemati,et al.  Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering , 2010 .

[5]  Ling Liu,et al.  A reputation-based trust model for peer-to-peer e-commerce communities , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..

[6]  Torben P. Pedersen Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.

[7]  Karl Aberer,et al.  Managing trust in a peer-2-peer information system , 2001, CIKM '01.

[8]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[9]  LU Jian-de P2P Reputation Model Based on Trust and Recommendation , 2009 .

[10]  Chik How Tan,et al.  Certificateless Authenticated Two-Party Key Agreement Protocols , 2006, ASIAN.

[11]  Hannes Hartenstein,et al.  Defending the Sybil attack in P2P networks: taxonomy, challenges, and a proposal for self-registration , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[12]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.