首页 | 本学科首页   官方微博 | 高级检索  
     检索      

An ID-Based Authenticated Key Agreement Protocol for Peer-to-Peer Computing
作者姓名:陆荣幸  曹珍富  苏仁旺  柴震川
作者单位:Dept. of Computer Science and Eng. Shanghai Jiaotong Univ. Shanghai 200030 China,Dept. of Computer Science and Eng. Shanghai Jiaotong Univ. Shanghai 200030 China,College of Statistics and Computing Sci. Zhejiang Gongshang Univ. Hangzhou 310035,Dept. of Computer Science and Eng. Shanghai Jiaotong Univ. Shanghai 200030 China
基金项目:NationalNaturalScienceFoundationofChin(Nos.60225007,60572155)andScienceanTechnologyResearchProjectofShangh(Nos.04JC14055,04DZ07067)
摘    要:Introduction Overrecentyears,withtheemergenceofdis-tributedapplicationsovertheInternet,anewmod-elofcommunicationandcomputation,calledpeer-to-peer(P2P)computing,hasgainedgreatpopu-larity1-3].Contrarytothetraditionalclient-server model,P2Pcomputingeliminatesthenotionof“server”,andallpeersinP2Psystemcanactas clientsandserversatthesametime.Therefore,thesinglepointoffailureandthebottleneckof“server”encounteredinthetraditionalclient-serv-ermodelcanbeeliminated,andtheperformance andreliabilit…

关 键 词:ID号  协议  计算方法  计算机系统
文章编号:1007-1172(2006)02-0205-05
收稿时间:2005-12-15

An ID-Based Authenticated Key Agreement Protocol for Peer-to-Peer Computing
LU Rong-xing,CAO Zhen-fu,SU Ren-wang,CHAI Zhen-chuan.An ID-Based Authenticated Key Agreement Protocol for Peer-to-Peer Computing[J].Journal of Shanghai Jiaotong university,2006,11(2):205-209.
Authors:LU Rong-xing  CAO Zhen-fu  SU Ren-wang  CHAI Zhen-chuan
Abstract:Peer-to-peer computing has recently started to gain significant acceptance, since it can greatly increase the performance and reliability of overall system. However, the security issue is still a major gating factor for its full adoption. In order to guarantee the security of data exchanged between two peers in Peer-to-Peer system, this paper comes up with an ID-based authenticated key agreement from bilinear pairings and uses BAN logic to prove the protocol's security. Compared with other existing protocols, the proposed protocol seems more secure and efficient, since it adopts the static shared Diffie-Hellman key.
Keywords:peer-to-peer computing  authenticate key agreement  ID-based  BAN logic
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号