Efficient Trust Based Information Sharing Schemes over Distributed Collaborative Networks

In distributed collaborative networks such as peer-to-peer systems, privacy preserving information sharing and dissemination heavily relies on effective trust management. Trust based encryption (TBE) has been proposed to be a solution to enabling privacy preserving information sharing and dissemination for such networks. Unfortunately, the previously proposed schemes are not efficient in terms of communications overhead, and require a constantly online trust authority. In this paper, we propose two trust based encryption schemes with significantly improved efficiency. In the first scheme, we develop a generic transformation approach based on the recently proposed identity based broadcast encryption (IBBE) technique, which can significantly reduce both memory space and communication overhead when static reputation is considered. For the dynamic reputation scenarios, we present a trust based encryption scheme which is based on a recently proposed revocable identity based encryption technique, resulting in significantly reduced communication overhead at the central trust authority.

[1]  Brent Waters,et al.  Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.

[2]  Alan T. Sherman,et al.  Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..

[3]  Vipul Goyal,et al.  Identity-based encryption with efficient revocation , 2008, IACR Cryptol. ePrint Arch..

[4]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[5]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 1998, SIGCOMM '98.

[6]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[7]  Kenneth G. Paterson,et al.  Trust management for secure information flows , 2008, CCS.

[8]  Ian Goldberg,et al.  Practical Robust Communication in DHTs Tolerating a Byzantine Adversary , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.

[9]  Sushil Jajodia,et al.  Providing Witness Anonymity Under Peer-to-Peer Settings , 2010, IEEE Transactions on Information Forensics and Security.

[10]  Hideki Imai,et al.  Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes , 2009, IMACC.

[11]  Yuguang Fang,et al.  Efficient trust based information sharing schemes over distributed collaborative networks , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[12]  Brent Waters,et al.  Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) , 2009, EUROCRYPT.

[13]  Cécile Delerablée,et al.  Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys , 2007, ASIACRYPT.

[14]  Ben Lynn,et al.  On the implementation of pairing-based cryptosystems , 2007 .

[15]  Patrick Traynor,et al.  Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems , 2009, IEEE Trans. Parallel Distributed Syst..

[16]  Alfred Menezes,et al.  Reducing elliptic curve logarithms to logarithms in a finite field , 1993, IEEE Trans. Inf. Theory.

[17]  Eric J. Harder,et al.  Key Management for Multicast: Issues and Architectures , 1999, RFC.

[18]  Songwu Lu,et al.  Secure Incentives for Commercial Ad Dissemination in Vehicular Networks , 2007, IEEE Transactions on Vehicular Technology.

[19]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[20]  Moni Naor,et al.  Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[21]  Xiaodong Lin,et al.  An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs , 2010, 2010 Proceedings IEEE INFOCOM.