Download now Free registration required
P2P network is open, anonymous and dynamical in contrast with conventional network. It's full of dishonesty, deceit, selfishness. It's necessary to build a robust security infrastructure system. The one important module of security infrastructure is to identify the users in transactions. This paper will propose an identification solution based on PKI. In the authors' algorithm, the peer generates their public-private key pairs by themselves, issues certificates, and performs authentication without any centralized services. It can realize the identification, meanwhile keep peers anonymous. Moreover, it can limit the quantity of ID that a user applies for; alleviate the risk of Sybil attack.
- Format: PDF
- Size: 467.64 KB