For Full-Text PDF, please login, if you are a member of IEICE,|
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
An Elliptic Curve-Based Trust Management Protocol in Peer-to-Peer Networks
Aiguo CHEN Guangchun LUO Jinsheng REN
IEICE TRANSACTIONS on Information and Systems
Publication Date: 2014/06/01
Online ISSN: 1745-1361
Type of Manuscript: LETTER
Category: Information Network
peer-to-peer, authentication, trust, trust management,
Full Text: PDF(80.2KB)>>
Establishing trust measurements among peer-to-peer (P2P) networks is fast becoming a de-facto standard, and a fair amount of work has been done in the area of trust aggregation and calculation algorithms. However, the area of developing secure underlying protocols to distribute and access the trust ratings in the overlay network has been relatively unexplored. We propose an elliptic curve-based trust management protocol for P2P systems, which is designed to provide authentication and signature functions to protect the processes of trust value query and rating report. Additionally, instead of using single identities, the protocol generates two verifiable pseudonyms, one is used for transaction, the other is applied when the peer acts as a trust holding peer. A security analysis shows that the proposed protocol is extremely secure in the face of a variety of possible attacks.