期刊文献+

一种基于PKI的P2P身份认证技术 被引量:7

A Peer-to-Peer Identity Authentication Technology Based on PKI
下载PDF
导出
摘要 目前P2P技术发展非常迅速并且得到大量应用,但由于P2P网络本身的结构特点使之面临很多安全问题,尤其是身份认证技术几乎在所有主流的P2P软件中研究的都不够细腻,而身份认证却是P2P网络安全的重要组成部分。文中提出一种基于PKI的P2P身份认证技术,在中心化结构P2P网络中设置认证机构,认证机构中存储P2P网络中节点的地址和公私钥对。由于认证机构中公私钥对的唯一性,节点通过私钥加密,公钥解密可以达到确认节点身份的目的,同时可以实现重要信息的加密传输。模拟实验表明该技术有效地提高了中心化结构P2P网络的安全性和健壮性。 P2P technology currently is developing very rapidly and has been widely used, because of characteristics of its network structure, it is facing many security issues, especially the identity authentication technology in almost all mainstream P2P software is not deeply studied yet, and identity authentication is an important component of network security, a peer- to- peer identity authentication technology based on PKI is researched,the center structured peer- to - peer networks setup a certificate authority, the certificate authority keeps peer's internet protocol and couple of punic and private keys in center structured peer- to- peer network. Because the couple of public and private keys are unique in the certificate authority, the peer can be identified by using its private key encryption and public key deeryption, it also can be used in encrypting massage, simulation results show that this technology enhances the security and stability efficiency in center structured peer- to - peer networks.
作者 贺锋 王汝传
出处 《计算机技术与发展》 2009年第10期181-184,188,共5页 Computer Technology and Development
基金 国家自然科学基金(60573141 60773041) 江苏省自然科学基金(BK2008451) 国家高科技863项目(2006AA01Z439 2007AA01Z404 2007AA01Z478) 南京市高科技项目(2007软资127) 现代通信国家重点实验室基金(9140C1105040805) 江苏省博士后基金(0801019C) 江苏高校科技创新计划项目(CX08B-085Z CX08B-086Z)
关键词 对等网络 身份认证 安全 公钥基础设施 P2P identity authentication security public key infrastructure
  • 相关文献

参考文献7

二级参考文献19

  • 1董健全,武雪丽,李智昕.P2P网络中应用移动Agent进行资源搜索的研究[J].计算机工程与设计,2005,26(1):27-30. 被引量:11
  • 2张书钦,芦东昕,杨永田.对等网络中基于信任的访问控制研究[J].计算机科学,2005,32(5):31-33. 被引量:15
  • 3欧阳电平,孙炎林,赵丽.基于B/S模式的网络教学辅助系统的设计与实现——学生注册与在线学习管理[J].中国管理信息化,2006,9(7):57-59. 被引量:7
  • 4NashA DuaneW 等 张玉清 陈建奇 等译.公钥基础设施(PKI)实现和管理电子安全[M].北京:清华大学出版社,2002..
  • 5Ford W.Baum M S.安全电子商务—为数字签名和加密构造基础设施(第2版)[M].劳帼龄,等译.北京:人民邮电出版社,2002.
  • 6李明柱.PKI技术及应用开发指南[EB/OL].http://www-900.ibm.com/developerWorks/cn/security/se-pkiusing/index.shtml,2002-06.
  • 7Tran H,Hitchens M,Varadharaj V,et al.A Trust based Access Control Framework for P2P File-Sharing Systems[A].Proceedings of the 38th Hawaii International Conference on System Sciences,2005[C].Washington,DC,USA:IEEE Computer Society,2005.
  • 8Gupta R,Somani A K.Reputation Management Framework and Its Use as Currency in Large-Scale Peer-to-Peer Networks,p2p[A].Fourth International Conference on Peer-to-Peer Computing (P2P'04)[C].Washington,DC,USA:IEEE Computer Society,2004.124-132.
  • 9Dewan P,Dasgupta P.Securing P2P Networks Using Peer Reputations:Is there a silver bullet?[A].consumer communications & networking conferece[C].Nevada,USA:CEA,2005.
  • 10Neil D,Garcia-Molina H,Beverly Y.Open problems in data -sharing peer-to-peer systems[A].The 9th Int'l Conf on Database Theory (ICDT)[C].Siena,Italy:[s.n.],2003.1-15.

共引文献23

同被引文献78

引证文献7

二级引证文献75

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部