An efficient user-to-user authentication scheme in peer-to-peer system

Zi Ming Zhao, Yan Fei Liu, Hui Li, Yi Xian Yang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Abstract

In peer-to-peer environment, information is directly exchanged between nodes instead of forwarding by a central server, hence user-to-user authentication becomes a critical security issue in such environment. Existing solutions are based on public-key cryptosystem. The main concerns in a public-key cryptosystem include authenticity of the public key and lack of efficiency. A trusted third party is also involved in a public-key environment. This paper proposed an efficient one-way hash function based user-to-user authentication scheme with smart card in peer-to-peer system. In the proposed scheme, the system and peers do not have to maintain verification tables, and a trusted third party is not needed in the run time. The proposed scheme achieves mutual authentication at very low computational cost, but also provides good security strength.

Original languageEnglish (US)
Title of host publicationProceedings - The 1st International Conference on Intelligent Networks and Intelligent Systems, ICINIS 2008
Pages263-266
Number of pages4
DOIs
StatePublished - 2008
Externally publishedYes
Event1st International Conference on Intelligent Networks and Intelligent Systems, ICINIS 2008 - Wuhan, China
Duration: Nov 1 2008Nov 3 2008

Publication series

NameProceedings - The 1st International Conference on Intelligent Networks and Intelligent Systems, ICINIS 2008

Other

Other1st International Conference on Intelligent Networks and Intelligent Systems, ICINIS 2008
Country/TerritoryChina
CityWuhan
Period11/1/0811/3/08

Keywords

  • Mutual authentication
  • One-way hash function
  • Peer-to-peer
  • Smart card

ASJC Scopus subject areas

  • Artificial Intelligence
  • Information Systems

Fingerprint

Dive into the research topics of 'An efficient user-to-user authentication scheme in peer-to-peer system'. Together they form a unique fingerprint.

Cite this