2010 5th International Conference on Future Information Technology 2010
DOI: 10.1109/futuretech.2010.5482740
|View full text |Cite
|
Sign up to set email alerts
|

CST: P2P Anonymous Authentication System Based on Collaboration Signature

Abstract: Anonymity has received increasing attention in the literature due to the users' awareness of their privacy nowadays. While anonymity related issues have been extensively studied in peer-to-peer (P2P) systems, numerous concerns have been raised about the issue of providing authentic partners in P2P systems. In addition, the network authority requires controlled anonymity so that misbehaving entities in the network remain traceable. We are working on seeking novel and more effective methods to control anonymity,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 27 publications
0
5
0
Order By: Relevance
“…Many P2P networks propose trust and reputation management schemes to solve this problem. Some works (Gokhale and Dasgupta, 2003;Wang et al, 2010;Tsang and Smith, 2008) use trust and reputation schemes to discover peers that can be considered as trusted peers of the network. These trusted peers are used in authentication as trusted third parties.…”
Section: Authentication In P2pmentioning
confidence: 99%
See 2 more Smart Citations
“…Many P2P networks propose trust and reputation management schemes to solve this problem. Some works (Gokhale and Dasgupta, 2003;Wang et al, 2010;Tsang and Smith, 2008) use trust and reputation schemes to discover peers that can be considered as trusted peers of the network. These trusted peers are used in authentication as trusted third parties.…”
Section: Authentication In P2pmentioning
confidence: 99%
“…The PPAA is proven to be secure in the Random Oracle Model (ROM). Wang et al (2010) present Collaboration Signature Trust (CST) to authenticate users anonymously. However, this mechanism is not safe in a semi-trusted environment such as a P2P network.…”
Section: Anonymous Authentication In P2pmentioning
confidence: 99%
See 1 more Smart Citation
“…The major drawback of this proposal is that it is difficult to manage redundancy in key parts and to react when a certain number of nodes leave the network simultaneously. This idea of distributed signatures was used by Wang et al [59] to manage the access rights of data.…”
Section: Related Workmentioning
confidence: 99%
“…in [Lu et al, 2007], the protocol proposed by Lu et al uses an anonymous zeroknowledge authentication protocol to support trust management such that users can use unforgeable and verifiable pseudonyms instead of their real identities. Similarly, Wang et al in [Wang et al, 2010] have proposed an anonymous collaboration signature authentication protocol in which each user, instead of using his or her real identity, owns an un-forgeable and verifiable identity signature and this identity signature is signed by a trusted party through a collaboration signature method.…”
Section: Anonymous Authenticationmentioning
confidence: 99%