TY - GEN
T1 - Leveraging identity-based cryptography for node ID assignment in structured P2P systems
AU - Ryu, Sunam
AU - Butler, Kevin
AU - Traynor, Patrick
AU - McDaniel, Patrick Drew
PY - 2007
Y1 - 2007
N2 - Structured peer-to-peer systems have grown enormously because of their scalability, efficiency and reliability. These systems assign a unique identifier to each user and object. However, current assignment schemes allow an adversary to carefully select user IDs and/or simultaneously obtain many pseudo-identities-leading ultimately to an ability to disrupt the P2P system in very targeted (and dangerous) ways. In this paper, we propose novel ID assignment protocols based on identity-based cryptography. This approach permits the acquisition of node IDs to be tightly regulated without many of the complexities and costs associated with traditional certificate solutions. We broadly consider the security requirements of ID assignment and present three protocols representing distinct threat and trust models. A detailed empirical study of the protocols is given. Our analysis shows that the cost of our identity-based protocols is nominal, and that the associated identity services can scale to millions of users using a limited number of servers.
AB - Structured peer-to-peer systems have grown enormously because of their scalability, efficiency and reliability. These systems assign a unique identifier to each user and object. However, current assignment schemes allow an adversary to carefully select user IDs and/or simultaneously obtain many pseudo-identities-leading ultimately to an ability to disrupt the P2P system in very targeted (and dangerous) ways. In this paper, we propose novel ID assignment protocols based on identity-based cryptography. This approach permits the acquisition of node IDs to be tightly regulated without many of the complexities and costs associated with traditional certificate solutions. We broadly consider the security requirements of ID assignment and present three protocols representing distinct threat and trust models. A detailed empirical study of the protocols is given. Our analysis shows that the cost of our identity-based protocols is nominal, and that the associated identity services can scale to millions of users using a limited number of servers.
UR - http://www.scopus.com/inward/record.url?scp=35248850713&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=35248850713&partnerID=8YFLogxK
U2 - 10.1109/AINAW.2007.221
DO - 10.1109/AINAW.2007.221
M3 - Conference contribution
AN - SCOPUS:35248850713
SN - 0769528473
SN - 9780769528472
T3 - Proceedings - 21st International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINAW'07
SP - 519
EP - 524
BT - Proceedings - 21st International Conference on Advanced Information Networking and ApplicationsWorkshops/Symposia, AINAW'07
T2 - 21st International Conference on Advanced Information Networking and ApplicationsWorkshops/Symposia, AINAW'07
Y2 - 21 May 2007 through 23 May 2007
ER -