Chord-PKI: Embedding a public key infrastructure into the chord overlay network

6Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Our goal in this paper is to provide authentication, encryption and non-repudiation services for nodes within Peer-to-Peer networks, in an efficient and scalable way. To accomplish this, we propose a distributed Public Key Infrastructure model, suitable for Peer-to-Peer networks and more particularly for the Chord protocol. Our solution integrates the PKI infrastructure within the Chord architecture. We use well known cryptographic techniques as building blocks, such as threshold cryptography and proactive updating. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Avramidis, A., Kotzanikolaou, P., & Douligeris, C. (2007). Chord-PKI: Embedding a public key infrastructure into the chord overlay network. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4582 LNCS, pp. 354–361). Springer Verlag. https://doi.org/10.1007/978-3-540-73408-6_27

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free