Does Proactive Secret Sharing Perform in Peer-to-Peer Systems?

نویسندگان

  • Nicolas Liebau
  • Andreas Mauthe
  • Vasilios Darlagiannis
  • Ralf Steinmetz
چکیده

Trustworthy applications in fully decentralized systems require a trust anchor. This paper describes how such an anchor can be implemented efficiently in p2p systems. The basic concept is to use threshold cryptography in order to sign messages by a quorum of peers. The focus is put on advanced mechanisms to secure the shares of the secret key over time, using proactive secret sharing. This mechanism was researched in context of the token-based accounting scheme.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

P2P Network Trust Management Survey

Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...

متن کامل

Poster: A Distributed Security Architecture for P2PSIP

Since early days, peer-to-peer (P2P) protocols have proven significant improvements over traditional client-server models. On the other hand, the Session Initiation Protocol (SIP) is a popular protocol for establishing multimedia sessions, and uses a client-server approach. P2PSIP is an architecture for deploying SIP services over a P2P network overlay, and thus leverages the limitations of cli...

متن کامل

Mobile Music Making

We present a system for collaborative musical creation on mobile wireless networks. The work extends on simple peerto-peer file sharing systems towards ad-hoc mobility and streaming. It extends upon music listening from a passive act to a proactive, participative activity. The system consists of a network based interactive music engine and a portable rendering player. It serves as a platform fo...

متن کامل

Security Analysis of a Hash-Based Secret Sharing Scheme

Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...

متن کامل

CITADEL: a content protection architecture for decentralized peer-to-peer file sharing systems

There is an increased interest, by content creators and owners, in content protection systems that provide the ability to control or restrict the content that can be shared on peer-to-peer file sharing systems. Some content protection systems have been proposed for centralized peer-to-peer systems (such as Napster) where a central authority controls all indexing and querying. These systems cann...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011