Establishing trust measurements among peer-to-peer (P2P) networks is fast becoming a de-facto standard, and a fair amount of work has been done in the area of trust aggregation and calculation algorithms. However, the area of developing secure underlying protocols to distribute and access the trust ratings in the overlay network has been relatively unexplored. We propose an elliptic curve-based trust management protocol for P2P systems, which is designed to provide authentication and signature functions to protect the processes of trust value query and rating report. Additionally, instead of using single identities, the protocol generates two verifiable pseudonyms, one is used for transaction, the other is applied when the peer acts as a trust holding peer. A security analysis shows that the proposed protocol is extremely secure in the face of a variety of possible attacks.
Aiguo CHEN
University of Electronic Science and Technology of China
Guangchun LUO
University of Electronic Science and Technology of China
Jinsheng REN
University of Electronic Science and Technology of China
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Aiguo CHEN, Guangchun LUO, Jinsheng REN, "An Elliptic Curve-Based Trust Management Protocol in Peer-to-Peer Networks" in IEICE TRANSACTIONS on Information,
vol. E97-D, no. 6, pp. 1656-1660, June 2014, doi: 10.1587/transinf.E97.D.1656.
Abstract: Establishing trust measurements among peer-to-peer (P2P) networks is fast becoming a de-facto standard, and a fair amount of work has been done in the area of trust aggregation and calculation algorithms. However, the area of developing secure underlying protocols to distribute and access the trust ratings in the overlay network has been relatively unexplored. We propose an elliptic curve-based trust management protocol for P2P systems, which is designed to provide authentication and signature functions to protect the processes of trust value query and rating report. Additionally, instead of using single identities, the protocol generates two verifiable pseudonyms, one is used for transaction, the other is applied when the peer acts as a trust holding peer. A security analysis shows that the proposed protocol is extremely secure in the face of a variety of possible attacks.
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.E97.D.1656/_p
Copy
@ARTICLE{e97-d_6_1656,
author={Aiguo CHEN, Guangchun LUO, Jinsheng REN, },
journal={IEICE TRANSACTIONS on Information},
title={An Elliptic Curve-Based Trust Management Protocol in Peer-to-Peer Networks},
year={2014},
volume={E97-D},
number={6},
pages={1656-1660},
abstract={Establishing trust measurements among peer-to-peer (P2P) networks is fast becoming a de-facto standard, and a fair amount of work has been done in the area of trust aggregation and calculation algorithms. However, the area of developing secure underlying protocols to distribute and access the trust ratings in the overlay network has been relatively unexplored. We propose an elliptic curve-based trust management protocol for P2P systems, which is designed to provide authentication and signature functions to protect the processes of trust value query and rating report. Additionally, instead of using single identities, the protocol generates two verifiable pseudonyms, one is used for transaction, the other is applied when the peer acts as a trust holding peer. A security analysis shows that the proposed protocol is extremely secure in the face of a variety of possible attacks.},
keywords={},
doi={10.1587/transinf.E97.D.1656},
ISSN={1745-1361},
month={June},}
Copy
TY - JOUR
TI - An Elliptic Curve-Based Trust Management Protocol in Peer-to-Peer Networks
T2 - IEICE TRANSACTIONS on Information
SP - 1656
EP - 1660
AU - Aiguo CHEN
AU - Guangchun LUO
AU - Jinsheng REN
PY - 2014
DO - 10.1587/transinf.E97.D.1656
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E97-D
IS - 6
JA - IEICE TRANSACTIONS on Information
Y1 - June 2014
AB - Establishing trust measurements among peer-to-peer (P2P) networks is fast becoming a de-facto standard, and a fair amount of work has been done in the area of trust aggregation and calculation algorithms. However, the area of developing secure underlying protocols to distribute and access the trust ratings in the overlay network has been relatively unexplored. We propose an elliptic curve-based trust management protocol for P2P systems, which is designed to provide authentication and signature functions to protect the processes of trust value query and rating report. Additionally, instead of using single identities, the protocol generates two verifiable pseudonyms, one is used for transaction, the other is applied when the peer acts as a trust holding peer. A security analysis shows that the proposed protocol is extremely secure in the face of a variety of possible attacks.
ER -