Anonymous and Distributed Authentication for Peer-to-Peer Networks

0Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.

Abstract

Well-known authentication mechanisms such as Public-key Infrastructure (PKI) and Identity-based Public-key Certificates (ID-PKC) are not suitable for integration in a Peer-to-Peer (P2P) network environment, the reason being either the lack of or the difficulty in maintaining a centralized authority to manage the certificates. Authentication becomes even harder in anonymous environments. In this study, we present three authentication protocols such that the users can authenticate themselves in an anonymous P2P network, without revealing their identities. The first protocol uses existing ring signature schemes to obtain anonymous authentication, the second is an anonymous authentication protocol utilizing secret sharing schemes, and lastly a zero-knowledge-based anonymous authentication protocol. We provide security justifications for the three aforementioned protocols in terms of anonymity, completeness, soundness, resilience to impersonation attacks, and resilience to replay attacks. We also provide examples of conceptual topologies and how the peers would behave and rearrange in case of failure

Cite

CITATION STYLE

APA

Tennakoon, P., Karunathilaka, S., Lavakumar, R., & Alawatugoda, J. (2023). Anonymous and Distributed Authentication for Peer-to-Peer Networks. Journal of Computer Science, 19(1), 1–10. https://doi.org/10.3844/jcssp.2023.1.10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free