Title :
A comparison analysis of trust-adaptive approaches to deliver signed public keys in P2P systems
Author_Institution :
eCAMPUS University, School of Engineering, Via Isimbardi 10, 22060, Novedrate, CO, Italy, University of Parma, Department of Information Engineering, V.le G.P. Usberti 181/A, 43124, Parma, PR, Italy
fDate :
7/1/2015 12:00:00 AM
Abstract :
An important and common prerequisite of many asymmetric cryptography systems is the availability of a secure mechanism for exchanging or distributing public keys. In this paper we compare two adaptive trust-based distributed schemes to deliver public keys in a peer-to-peer network. In such a scenario, centralized solutions, for example based on a certification authority or a public key infrastructure, cannot be used. For this reason we considered a completely distributed approach creating a sort of context aware web-of-trust. This is achieved in two different trust-based manners: one considering a classic request-response scheme and another one that exploits a Distributed Hash Table (DHT). We compare performances of both solutions trying to find an optimum trade-off.
Keywords :
"Public key","Peer-to-peer computing","Protocols","Authentication","Heuristic algorithms","Conferences"
Conference_Titel :
New Technologies, Mobility and Security (NTMS), 2015 7th International Conference on
DOI :
10.1109/NTMS.2015.7266463