An authentication protocol without trusted third party on P2P network

2Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A CLK-Based secure authentication protocol is proposed which provides the anonymity and the ability to store data securely. The trusted third party (key information center) is not needed when the secure network system is set up. The protocol avoids the escrow problem inidentity-based cryptosystem and the secure delivery of private keys. The security of protocol is based on some underlying problems closely related to the Computational Diffie-Hellman Problem and Bilinear Diffie-Hellman Problem are computationally hard. The protocol is studied for a model P2P storage system that needs to implement file access rights. ©2010 IEEE.

Author supplied keywords

Cite

CITATION STYLE

APA

Zhou, Y., & Lin, H. (2010). An authentication protocol without trusted third party on P2P network. In Proceedings of the 2010 2nd International Conference on Future Computer and Communication, ICFCC 2010 (Vol. 2). https://doi.org/10.1109/ICFCC.2010.5497580

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free