Abstract | ||
---|---|---|
Compared with the public key infrastructure (PKI) technique, identity based cryptography (IBC) can simplify the key management process in peer-to-peer (P2P) networks significantly. The identity of a peer (e.g., peer identifier or peer geometric coordinate) in P2P overlay networks is used to create its public key, thus avoiding the use of any certificates. These IBC-based systems are scalable, simple to administer, and each user can carry out anytime/anywhere encryption, establish secure communication channels, prove its identity to other nodes, verify protected messages and produce a form of signature with non-repudiation properties. |
Year | DOI | Venue |
---|---|---|
2009 | 10.1145/1529282.1529298 | SAC |
Keywords | Field | DocType |
secure communication channel,ibc-based system,securing key,peer-to-peer network,public key infrastructure,non-repudiation property,public key,key management process,p2p overlay network,secure communication,p2p,key management,overlay network | Key distribution,Key management,Public key infrastructure,Computer security,Cryptography,Computer science,Dead Peer Detection,Computer network,Encryption,Public-key cryptography,Overlay network | Conference |
Citations | PageRank | References |
0 | 0.34 | 4 |
Authors | ||
7 |
Name | Order | Citations | PageRank |
---|---|---|---|
Cong Tang | 1 | 20 | 7.18 |
Ruichuan Chen | 2 | 205 | 18.95 |
Zhuhua Cai | 3 | 90 | 7.48 |
Anmin Xie | 4 | 1 | 0.73 |
Jianbin Hu | 5 | 179 | 22.43 |
Liyong Tang | 6 | 34 | 3.82 |
Zhong Chen | 7 | 503 | 58.35 |