DocumentCode :
2145361
Title :
Halo: A Hierarchical Identity-Based Public Key Infrastructure for Peer-to-Peer Opportunistic Collaboration
Author :
Tseng, Fu-Kuo ; Zao, John K. ; Liu, Yung-Hsiang ; Kuo, Fang-Po
Author_Institution :
Comput. Sci. Dept., Nat. Chiao Tung Univ., Hsinchu
fYear :
2009
fDate :
18-20 May 2009
Firstpage :
672
Lastpage :
679
Abstract :
The lack of information security protection for peer-to-peer systems has hampered the use of this robust and scalable technology in sensitive applications. The security weakness is rooted in the server-less architecture and the demand driven ad-hoc operation scenarios of peer-to-peer systems. Together, they prohibit scalable key management using traditional symmetric/ asymmetric cryptographic techniques. The advent of hierarchical identity-based cryptography and thresholded/joint secret sharing offers a possible solution to this problem. In this paper, we present the design of Halo, a hierarchical identity-based public key infrastructure that uses these novel technologies to perform recursive instantiation of private key generators and establish a trust hierarchy with unlimited number of levels. The PKI thus enables the employment of hierarchical identity-based public key encryption, signature, and signcryption for the protection of peer-to-peer applications. The effort to implement a proof-of-concept prototype as a JXTA service module was also discussed.
Keywords :
Java; digital signatures; peer-to-peer computing; private key cryptography; public key cryptography; JXTA service module; asymmetric cryptographic techniques; demand driven ad-hoc operation scenarios; hierarchical identity-based public key infrastructure; information security protection; joint secret sharing; peer-to-peer opportunistic collaboration; peer-to-peer systems; private key generators; proof-of-concept prototype; scalable key management; server-less architecture; signcryption; symmetric cryptographic techniques; thresholded secret sharing; trust hierarchy; Collaboration; Employment; Identity-based encryption; Information security; Peer to peer computing; Protection; Prototypes; Public key; Public key cryptography; Robustness; access control; identity based cryptography; key exchange; peer-to-peer applications; public key infra¬structure;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Mobile Data Management: Systems, Services and Middleware, 2009. MDM '09. Tenth International Conference on
Conference_Location :
Taipei
Print_ISBN :
978-1-4244-4153-2
Electronic_ISBN :
978-0-7695-3650-7
Type :
conf
DOI :
10.1109/MDM.2009.115
Filename :
5089022
Link To Document :
بازگشت