Pseudo Trust: Zero-Knowledge Authentication in Anonymous Peer-to-Peer Protocols

نویسندگان

  • Li Lu
  • Yunhao Liu
  • Lei Hu
  • Jinsong Han
  • Lionel M. Ni
چکیده

Technical Report TR 2006-10 Abstract— Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s identity. Hence, there exists an inherent tradeoff between trust and anonymity. To the best of our knowledge, there is currently no P2P protocol that provides complete mutual anonymity as well as authentication and trust management. We propose a zero-knowledge authentication scheme called Pseudo Trust (PT), where each peer, instead of using its real identity, generates an unforgeable and verifiable pseudonym using a one-way hash function. A novel authentication scheme based on Zero-Knowledge Proof is designed so peers can be authenticated without leaking any sensitive information. With the help of PT, most existing identity-based trust management schemes become applicable in mutual anonymous P2P systems. We analyze the levels of security and anonymity in PT, and evaluate its performance using trace-driven simulations. A prototype Pseudo Trust-enabled P2P network is running in our labs at CAS Beijing, Hong Kong UST, and other sites. The strengths of Pseudo Trust include the lack of need for a centralized trusted party or CA, high scalability and security, low traffic and cryptography processing overheads, and man-in-the-middle attack resistance. We aim for the Pseudo Trust design to be included in the P2P trust and anonymity context.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Distributed Authentication for Peer-to-Peer Networks

A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Security services for adhoc networks cannot assume the existence of a particular infrastructure. Peer-to-peer technology is promising in addressing security issues in ad-hoc networks. We provide a novel; cryptographically se...

متن کامل

A Secure and Privacy aware framework for p2p networks

Peer-to-peer (P2P) networks have become popular as a new paradigm for information exchange and are being used in many applications. The open and anonymous nature of a P2P network makes it an ideal medium for attackers to spread malicious content. In this paper we propose a novel authentication scheme based on Zero-Knowledge Proof and a reputation based peer selection system so that peers can be...

متن کامل

Multifold node authentication in mobile ad hoc networks

An ad hoc network is a collection of nodes that do not need to rely on a predefined infrastructure to keep the network connected. Nodes communicate amongst each other using wireless radios and operate by following a peer-to-peer network model. In this article we propose a multifold node authentication approach for protecting mobile ad hoc networks. The security requirements for protecting data ...

متن کامل

Policy Based Framework for Trust Management and Evolution of Peer to Peer Groups

Peer to peer collaborative groups are becoming increasingly popular for collaborative applications like video/audio conferencing, IP telephony, file sharing, collaborative work spaces, and multi-user games. The decentralized nature of these groups gives rise to the need of a secure group layer which integrates authentication, admission control, authorization, access control and key management. ...

متن کامل

A Survey on Security, Privacy and Anonymity in Legal Distribution of Copyrighted Multimedia Content over Peer-to-Peer Networks

..................................................................................................................5 Introduction..............................................................................................................6 1. Secuirty, privacy and anonymity challenges in legal P2P content distribution systems. .......................................................................

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006