Does Proactive Secret Sharing Perform in Peer-to-Peer Systems?
نویسندگان
چکیده
Trustworthy applications in fully decentralized systems require a trust anchor. This paper describes how such an anchor can be implemented efficiently in p2p systems. The basic concept is to use threshold cryptography in order to sign messages by a quorum of peers. The focus is put on advanced mechanisms to secure the shares of the secret key over time, using proactive secret sharing. This mechanism was researched in context of the token-based accounting scheme.
منابع مشابه
P2P Network Trust Management Survey
Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...
متن کاملPoster: A Distributed Security Architecture for P2PSIP
Since early days, peer-to-peer (P2P) protocols have proven significant improvements over traditional client-server models. On the other hand, the Session Initiation Protocol (SIP) is a popular protocol for establishing multimedia sessions, and uses a client-server approach. P2PSIP is an architecture for deploying SIP services over a P2P network overlay, and thus leverages the limitations of cli...
متن کاملMobile Music Making
We present a system for collaborative musical creation on mobile wireless networks. The work extends on simple peerto-peer file sharing systems towards ad-hoc mobility and streaming. It extends upon music listening from a passive act to a proactive, participative activity. The system consists of a network based interactive music engine and a portable rendering player. It serves as a platform fo...
متن کاملSecurity Analysis of a Hash-Based Secret Sharing Scheme
Secret sharing schemes perform an important role in protecting se-cret by sharing it among multiple participants. In 1979, (t; n) threshold secret sharing schemes were proposed by Shamir and Blakley independently. In a (t; n) threshold secret sharing scheme a secret can be shared among n partic-ipants such that t or more participants can reconstruct the secret, but it can not be reconstructed b...
متن کاملCITADEL: a content protection architecture for decentralized peer-to-peer file sharing systems
There is an increased interest, by content creators and owners, in content protection systems that provide the ability to control or restrict the content that can be shared on peer-to-peer file sharing systems. Some content protection systems have been proposed for centralized peer-to-peer systems (such as Napster) where a central authority controls all indexing and querying. These systems cann...
متن کامل