A Hierarchical Trusted Third-party System for Secure Peer-to-peer Transactions

نویسندگان

  • Khoi Vu Nguyen
  • Mark Stamp
  • Robert Chun
  • Sami Khuri
چکیده

A HIERARCHICAL TRUSTED THIRD-PARTY SYSTEM FOR SECURE PEER-TOPEER TRANSACTIONS by Khoi Vu Nguyen A peer-to-peer (P2P) network is a distributed network of peer computers loosely connected through the Internet. Transactions in a P2P network are often conducted on a no-security basis. Moreover, peer anonymity is often highly desirable, which makes security even more difficult to achieve. In most cases, a peer executes a transaction solely based on the faith that the other peer plays by the rules. Here we propose a hierarchical Trusted Third-Party (TTP) system that facilitates secure transactions between peers in an existing P2P network. This system is designed to provide mutual authentication by using public key cryptography for peers to authenticate the TTP system and by using symmetric key cryptography for the TTP system to authenticate peers. After logging into the system, two peers can obtain a shared secret key from the TTP system to form a secure channel over which all transactions are encrypted using the secret key. The TTP system is designed to operate as an independent entity that peers can choose to join independently of their P2P network and can remain anonymous among each other. In addition, a reputation scheme, in which peers rate each other, is employed in the TTP system. This self-policing system provides a relative measure of trust among peers so that a peer can decide whether to allow a transaction based on another peer’s rating. The anonymity of peers in P2P systems creates many difficulties for establishing an accurate rating system. However, we believe this is still achievable to a degree.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Disintermediation of Inter-Blockchain Transactions

Different versions of peer-to-peer electronic cash exist as data represented by separate blockchains. Payments between such systems cannot be sent directly from one party to another without going through a financial institution. Bitcoin provided part of the solution but its utility is limited to intra-blockchain transactions. The benefits are lost if a trusted third party is required to execute...

متن کامل

A survey on approaches to anonymity in bitcoin and other cryptocurrencies

Bitcoin is a crypto currency with several advantages over previous approaches. Transactions are con®rmed and stored by a peer-to-peer network in a blockchain. Therefore, all transactions are public and soon solutions where designed to increase privacy in Bitcoin Many come with downsides, like requiring a trusted third-party or requiring modi®cations to Bitcoin. In this paper, we compare these a...

متن کامل

Efficient Electronic Gambling: An Extended Implementation of the Toolbox for Mental Card Games

There are many wonderful protocols in cryptography which are still waiting for their realization. Here we consider efficient solutions for secure electronic card games. Our contribution seems to be the first known practical implementation that requires no trusted third-party and simultaneously keeps the players’ strategies confidential. The provided open source library LibTMCG can be used for c...

متن کامل

HIR-CP-ABE: Hierarchical Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Secure and Flexible Data Sharing

Ciphertext Policy Attribute-Based Encryption (CPABE) has been proposed to implement the attribute-based access control model. In CP-ABE, data owners encrypt the data with a certain access policy such that only data users whose attributes satisfy the access policy could obtain the corresponding private decryption key from a trusted authority. Therefore, CP-ABE is considered as a promising fine-g...

متن کامل

Typed Computational Email for Serverless Distributed Applications

Peer agents are executable object-oriented email components exchanged between users as a basis of communication for distributed applications. Peer agents, which we implement, are strongly typed and are dispatched to user-installable trusted handlers based on their type. The type mechanism provides the flexible trust management needed to implement secure distributed distributed applications over...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007