An Elliptic Curve-Based Trust Management Protocol in Peer-to-Peer Networks

Aiguo CHEN  Guangchun LUO  Jinsheng REN  

IEICE TRANSACTIONS on Information and Systems   Vol.E97-D   No.6   pp.1656-1660
Publication Date: 2014/06/01
Online ISSN: 1745-1361
DOI: 10.1587/transinf.E97.D.1656
Type of Manuscript: LETTER
Category: Information Network
peer-to-peer,  authentication,  trust,  trust management,  

Full Text: PDF(80.2KB)>>
Buy this Article

Establishing trust measurements among peer-to-peer (P2P) networks is fast becoming a de-facto standard, and a fair amount of work has been done in the area of trust aggregation and calculation algorithms. However, the area of developing secure underlying protocols to distribute and access the trust ratings in the overlay network has been relatively unexplored. We propose an elliptic curve-based trust management protocol for P2P systems, which is designed to provide authentication and signature functions to protect the processes of trust value query and rating report. Additionally, instead of using single identities, the protocol generates two verifiable pseudonyms, one is used for transaction, the other is applied when the peer acts as a trust holding peer. A security analysis shows that the proposed protocol is extremely secure in the face of a variety of possible attacks.