Title : 
Halo: A Hierarchical Identity-Based Public Key Infrastructure for Peer-to-Peer Opportunistic Collaboration
         
        
            Author : 
Tseng, Fu-Kuo ; Zao, John K. ; Liu, Yung-Hsiang ; Kuo, Fang-Po
         
        
            Author_Institution : 
Comput. Sci. Dept., Nat. Chiao Tung Univ., Hsinchu
         
        
        
        
        
        
            Abstract : 
The lack of information security protection for peer-to-peer systems has hampered the use of this robust and scalable technology in sensitive applications. The security weakness is rooted in the server-less architecture and the demand driven ad-hoc operation scenarios of peer-to-peer systems. Together, they prohibit scalable key management using traditional symmetric/ asymmetric cryptographic techniques. The advent of hierarchical identity-based cryptography and thresholded/joint secret sharing offers a possible solution to this problem. In this paper, we present the design of Halo, a hierarchical identity-based public key infrastructure that uses these novel technologies to perform recursive instantiation of private key generators and establish a trust hierarchy with unlimited number of levels. The PKI thus enables the employment of hierarchical identity-based public key encryption, signature, and signcryption for the protection of peer-to-peer applications. The effort to implement a proof-of-concept prototype as a JXTA service module was also discussed.
         
        
            Keywords : 
Java; digital signatures; peer-to-peer computing; private key cryptography; public key cryptography; JXTA service module; asymmetric cryptographic techniques; demand driven ad-hoc operation scenarios; hierarchical identity-based public key infrastructure; information security protection; joint secret sharing; peer-to-peer opportunistic collaboration; peer-to-peer systems; private key generators; proof-of-concept prototype; scalable key management; server-less architecture; signcryption; symmetric cryptographic techniques; thresholded secret sharing; trust hierarchy; Collaboration; Employment; Identity-based encryption; Information security; Peer to peer computing; Protection; Prototypes; Public key; Public key cryptography; Robustness; access control; identity based cryptography; key exchange; peer-to-peer applications; public key infra¬structure;
         
        
        
        
            Conference_Titel : 
Mobile Data Management: Systems, Services and Middleware, 2009. MDM '09. Tenth International Conference on
         
        
            Conference_Location : 
Taipei
         
        
            Print_ISBN : 
978-1-4244-4153-2
         
        
            Electronic_ISBN : 
978-0-7695-3650-7
         
        
        
            DOI : 
10.1109/MDM.2009.115