A Distributed Certification System for Structured P2P Networks

  • François Lesueur
  • Ludovic Mé
  • Valérie Viet Triem Tong
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5127)


In this paper, we present a novel distributed certification system in which signing a certificate needs the collaboration of a fixed ratio of the nodes, hence a varying number of nodes. This number is dynamically adjusted to enforce the ratio in a fully distributed way, which is mandatory for decentralized varying-size P2P networks. A certificate allows then to link the key pair of a node to some rights granted to it.


P2P Security Distributed Certification 


  1. 1.
    Clip2: The gnutella protocol specification v0.4 (2000), http://www9.limewire.com/developer/gnutella_protocol_0.4.pdf
  2. 2.
    Stoica, I., Morris, R., Karger, D.R., Kaashoek, M.F., Balakrishnan, H.: Chord: A scalable peer-to-peer lookup service for internet applications. In: Proceedings of the ACM SIGCOMM Conference (SIGCOMM). Computer Communication Review, pp. 149–160. ACM Press, New York (2001)Google Scholar
  3. 3.
    Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for mobile ad hoc networks. In: Proceedings of the 9th IEEE International Conference on Network Protocols (ICNP). IEEE Computer Society, Los Alamitos (2001)Google Scholar
  4. 4.
    Saxena, N., Tsudik, G., Yi, J.H.: Experimenting with admission control in P2P. In: Proceedings of the International Workshop on Advanced Developments in System and Software Security (WADIS) (2003)Google Scholar
  5. 5.
    Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  6. 6.
    Shamir, A.: How to share a secret. Communications of the ACM 22(11) (1979)Google Scholar
  7. 7.
    Desmedt, Y.: Some recent research aspects of threshold cryptography. In: Okamoto, E. (ed.) ISW 1997. LNCS, vol. 1396, pp. 158–173. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  8. 8.
    Frankel, Y., Gemmell, P., MacKenzie, P.D., Yung, M.: Optimal-resilience proactive public-key cryptosystems. In: Proceedings of the 38th Annual IEEE Symposium on Foundations of Computer Science (FOCS). IEEE Computer Society, Los Alamitos (1997)Google Scholar
  9. 9.
    Boneh, Franklin,: Efficient Generation of Shared RSA Keys. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 425–439. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  10. 10.
    Jelasity, M., Jesi, G.P., Montresor, A., Voulgaris, S.: PeerSim P2P Simulator (2004), http://peersim.sourceforge.net/
  11. 11.
    Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: Defending against sybil attacks via social networks. In: Proceedings of the ACM SIGCOMM Conference (SIGCOMM), pp. 267–278. ACM Press, New York (2006)Google Scholar
  12. 12.
    Bryan, D.A., Lowekamp, B.B., Jennings, C.: SOSIMPLE: A serverless, standards-based, P2P SIP communication system. In: Proceedings of the International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications (AAA-IDEA) (2005)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2008

Authors and Affiliations

  • François Lesueur
    • 1
  • Ludovic Mé
    • 1
  • Valérie Viet Triem Tong
    • 1
  1. 1.SUPELEC, SSIR Group (EA 4039)Cesson-Sévigné cedexFrance

Personalised recommendations