A CLK-Based secure authentication protocol is proposed which provides the anonymity and the ability to store data securely. The trusted third party (key information center) is not needed when the secure network system is set up. The protocol avoids the escrow problem inidentity-based cryptosystem and the secure delivery of private keys. The security of protocol is based on some underlying problems closely related to the Computational Diffie-Hellman Problem and Bilinear Diffie-Hellman Problem are computationally hard. The protocol is studied for a model P2P storage system that needs to implement file access rights. ©2010 IEEE.
CITATION STYLE
Zhou, Y., & Lin, H. (2010). An authentication protocol without trusted third party on P2P network. In Proceedings of the 2010 2nd International Conference on Future Computer and Communication, ICFCC 2010 (Vol. 2). https://doi.org/10.1109/ICFCC.2010.5497580
Mendeley helps you to discover research relevant for your work.