{"title":"CST: P2P Anonymous Authentication System Based on Collaboration Signature","authors":"Xiaoliang Wang, Xingming Sun, Guang Sun, Dong Luo","doi":"10.1109/FUTURETECH.2010.5482740","DOIUrl":null,"url":null,"abstract":"Anonymity has received increasing attention in the literature due to the users' awareness of their privacy nowadays. While anonymity related issues have been extensively studied in peer-to-peer (P2P) systems, numerous concerns have been raised about the issue of providing authentic partners in P2P systems. In addition, the network authority requires controlled anonymity so that misbehaving entities in the network remain traceable. We are working on seeking novel and more effective methods to control anonymity, authentication and traceability. In this paper, we propose a security architecture to ensure anonymity and authentication for honest users and keep traceability for misbehaving users in P2P systems. We use Collaboration Signature Trust (CST) to resolve the conflicts among anonymity, authentication and traceability. Security analysis shows that the CST can perfectly solve tradeoff between anonymity, authentication and traceability.","PeriodicalId":380192,"journal":{"name":"2010 5th International Conference on Future Information Technology","volume":"67 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 5th International Conference on Future Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FUTURETECH.2010.5482740","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Anonymity has received increasing attention in the literature due to the users' awareness of their privacy nowadays. While anonymity related issues have been extensively studied in peer-to-peer (P2P) systems, numerous concerns have been raised about the issue of providing authentic partners in P2P systems. In addition, the network authority requires controlled anonymity so that misbehaving entities in the network remain traceable. We are working on seeking novel and more effective methods to control anonymity, authentication and traceability. In this paper, we propose a security architecture to ensure anonymity and authentication for honest users and keep traceability for misbehaving users in P2P systems. We use Collaboration Signature Trust (CST) to resolve the conflicts among anonymity, authentication and traceability. Security analysis shows that the CST can perfectly solve tradeoff between anonymity, authentication and traceability.