Article ID Journal Published Year Pages File Type
459726 Journal of Network and Computer Applications 2007 15 Pages PDF
Abstract

In this paper, we present two types of protocols that can achieve mutual anonymity in peer-to-peer (P2P) network environments, which means the identities of the service, requesters and providers, are anonymous to each other, to other peers, and even to the trusted third party (TTP). One of the two types of protocols is for hybrid P2P systems where there is a TTP to construct the transmission paths and look up the query files. The other type of protocol is for pure P2P environments where no TTP is involved in the session network. These two new protocols are based on primitive roots for three main reasons: simplicity, flexibility, and efficiency. Other issues concerning the P2P network structure as well as the security analyses of the proposed protocols will also be covered in this paper.

Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
, , ,