Leveraging identity-based cryptography for node ID assignment in structured P2P systems

Sunam Ryu, Kevin Butler, Patrick Traynor, Patrick Drew McDaniel

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Scopus citations

Abstract

Structured peer-to-peer systems have grown enormously because of their scalability, efficiency and reliability. These systems assign a unique identifier to each user and object. However, current assignment schemes allow an adversary to carefully select user IDs and/or simultaneously obtain many pseudo-identities-leading ultimately to an ability to disrupt the P2P system in very targeted (and dangerous) ways. In this paper, we propose novel ID assignment protocols based on identity-based cryptography. This approach permits the acquisition of node IDs to be tightly regulated without many of the complexities and costs associated with traditional certificate solutions. We broadly consider the security requirements of ID assignment and present three protocols representing distinct threat and trust models. A detailed empirical study of the protocols is given. Our analysis shows that the cost of our identity-based protocols is nominal, and that the associated identity services can scale to millions of users using a limited number of servers.

Original languageEnglish (US)
Title of host publicationProceedings - 21st International Conference on Advanced Information Networking and ApplicationsWorkshops/Symposia, AINAW'07
Pages519-524
Number of pages6
DOIs
StatePublished - 2007
Event21st International Conference on Advanced Information Networking and ApplicationsWorkshops/Symposia, AINAW'07 - Niagara Falls, ON, Canada
Duration: May 21 2007May 23 2007

Publication series

NameProceedings - 21st International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINAW'07
Volume2

Other

Other21st International Conference on Advanced Information Networking and ApplicationsWorkshops/Symposia, AINAW'07
Country/TerritoryCanada
CityNiagara Falls, ON
Period5/21/075/23/07

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Software
  • General Mathematics

Fingerprint

Dive into the research topics of 'Leveraging identity-based cryptography for node ID assignment in structured P2P systems'. Together they form a unique fingerprint.

Cite this