 Open Access
				Open Access 
				 Subscription or Fee Access
									Subscription or Fee Access
							Secure Keying in Peer Network using Secret Sharing Technique
Abstract
Keywords
References
E. Sit and R. Morris, “Security considerations for peer-to-peer distributed hash tables,” in IPTPS, 2002, pp. 261–269.
A. Shamir, “Identity-based cryptosystems and signature schemes,” in CRYPTO, 1984, pp. 47–53.
D. Boneh and M. K. Franklin, “Identity-based encryption from the weil pairing,” in CRYPTO, 2001, pp. 213–229.
B. Lee, C. Boyd, E. Dawson, K. Kim, J. Yang, and S. Yoo, “Secure key issuing in id-based cryptography,” in ACSW Frontiers, 2004, pp. 69–74.
R. Gangishetti, M. C. Gorantla, M. L. Das, A. Saxena, and V. P. Gulati, “An efficient secure key issuing protocol in id- based cryptosystems,” in ITCC (1), 2005, pp. 674–678.
A. Saxena,“Threshold ski protocol for id-based cryptosys- tems,” in IAS, 2007, pp.65–70.
Z.-L. Lu, G.-H.; Zhang, “Wheel of trust: A secure framework for overlay-based services,” ICC, pp. 1148–1153, 2007.
I. Stoica, R. Morris, D. R. Karger, M. F. Kaashoek, and H. Balakrishnan, “Chord: A scalable peer-to-peer lookup service for internet applications,” in SIGCOMM, 2001, pp.149–160.
E. K. Lua, “Securing peer-to-peer overlay networks from sybil attack,” in ISCIT’07, Sydney, Australia, 2007.
S. Ryu, K. R. B. Butler, P. Traynor, and P. D. McDaniel, “Leveraging identity-based cryptography for node id assignment in structured p2p systems,” in AINA Workshops (1), 2007, pp. 519–524.
L. M. Aiello, M. Milanesio, G. Ruffo, and R. Schifanella, “Tempering kademlia with a robust identity based system,” in Peer-to-Peer Computing, 2008, pp. 30–39.
A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, no. 11, pp. 612–613, 1979.
I. Baumgart and S. Mies, “S/kademlia: A practicable approach towards secure key-based routing,” in ICPADS, 2007, pp. 1–8.
R. Chen, W. Guo, L. Tang, J. Hu, and Z. Chen, “Scalable byzantine fault tolerant public key authentication for peer-to- peer networks,” in Euro-Par, 2008.
M. J. Freedman and R. Morris, “Tarzan: a peer-to-peer anonymizing network layer,” in CCS, 2002, pp. 193–206.
B. Parno, D. Wendlandt, E. Shi, A. Perrig, B. M. Maggs, and Y.-C. Hu, “Portcullis: protecting connection setup from denial-of-capability attacks,” in SIGCOMM, 2007, pp. 289–300.
P. Maymounkov and D. Mazie`res, “Kademlia: A peer-to-peer information system based on the xor metric,” in IPTPS, 2002, pp. 53–65.
Refbacks
- There are currently no refbacks.
 
	This work is licensed under a Creative Commons Attribution 3.0 License.
 
 
  
  
  
  
  Email this article
			Email this article