• DocumentCode
    2145361
  • Title

    Halo: A Hierarchical Identity-Based Public Key Infrastructure for Peer-to-Peer Opportunistic Collaboration

  • Author

    Tseng, Fu-Kuo ; Zao, John K. ; Liu, Yung-Hsiang ; Kuo, Fang-Po

  • Author_Institution
    Comput. Sci. Dept., Nat. Chiao Tung Univ., Hsinchu
  • fYear
    2009
  • fDate
    18-20 May 2009
  • Firstpage
    672
  • Lastpage
    679
  • Abstract
    The lack of information security protection for peer-to-peer systems has hampered the use of this robust and scalable technology in sensitive applications. The security weakness is rooted in the server-less architecture and the demand driven ad-hoc operation scenarios of peer-to-peer systems. Together, they prohibit scalable key management using traditional symmetric/ asymmetric cryptographic techniques. The advent of hierarchical identity-based cryptography and thresholded/joint secret sharing offers a possible solution to this problem. In this paper, we present the design of Halo, a hierarchical identity-based public key infrastructure that uses these novel technologies to perform recursive instantiation of private key generators and establish a trust hierarchy with unlimited number of levels. The PKI thus enables the employment of hierarchical identity-based public key encryption, signature, and signcryption for the protection of peer-to-peer applications. The effort to implement a proof-of-concept prototype as a JXTA service module was also discussed.
  • Keywords
    Java; digital signatures; peer-to-peer computing; private key cryptography; public key cryptography; JXTA service module; asymmetric cryptographic techniques; demand driven ad-hoc operation scenarios; hierarchical identity-based public key infrastructure; information security protection; joint secret sharing; peer-to-peer opportunistic collaboration; peer-to-peer systems; private key generators; proof-of-concept prototype; scalable key management; server-less architecture; signcryption; symmetric cryptographic techniques; thresholded secret sharing; trust hierarchy; Collaboration; Employment; Identity-based encryption; Information security; Peer to peer computing; Protection; Prototypes; Public key; Public key cryptography; Robustness; access control; identity based cryptography; key exchange; peer-to-peer applications; public key infra¬structure;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Mobile Data Management: Systems, Services and Middleware, 2009. MDM '09. Tenth International Conference on
  • Conference_Location
    Taipei
  • Print_ISBN
    978-1-4244-4153-2
  • Electronic_ISBN
    978-0-7695-3650-7
  • Type

    conf

  • DOI
    10.1109/MDM.2009.115
  • Filename
    5089022