By Topic

An Efficient User-to-User Authentication Scheme in Peer-to-Peer System

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Zi-ming Zhao ; Inf. Security Center, Beijing Univ. of Posts & Telecommun., Beijing ; Yan-fei Liu ; Hui Li ; Yi-Xian Yang

In peer-to-peer environment, information is directly exchanged between nodes instead of forwarding by a central server, hence user-to-user authentication becomes a critical security issue in such environment. Existing solutions are based on public-key cryptosystem. The main concerns in a public-key cryptosystem include authenticity of the public key and lack of efficiency. A trusted third party is also involved in a public-key environment. This paper proposed an efficient one-way hash function based user-to-user authentication scheme with smart card in peer-to-peer system. In the proposed scheme, the system and peers do not have to maintain verification tables, and a trusted third party is not needed in the run time. The proposed scheme achieves mutual authentication at very low computational cost, but also provides good security strength.

Published in:

Intelligent Networks and Intelligent Systems, 2008. ICINIS '08. First International Conference on

Date of Conference:

1-3 Nov. 2008