TY - GEN
T1 - Efficient content authentication in peer-to-peer networks
AU - Tamassia, Roberto
AU - Triandopoulos, Nikos
PY - 2007
Y1 - 2007
N2 - We study a new model for data authentication over peer-to-peer (p2p) storage networks, where data items are stored, queried and authenticated in a totally decentralized fashion. The model captures the security requirements of emerging distributed computing applications. We present an efficient construction of a distributed Merkle tree (DMT), which realizes an authentication tree over a p2p network, thus extending a fundamental cryptographic technique to distributed environments. We show how our DMT can be used to design an authenticated distributed hash table that is secure against replay attacks and consistent with the update history. Our scheme is built on top of a broad class of existing p2p overlay networks and achieves generality by using only the basic functionality of object location. We use this scheme to design the first efficient distributed authenticated dictionary.
AB - We study a new model for data authentication over peer-to-peer (p2p) storage networks, where data items are stored, queried and authenticated in a totally decentralized fashion. The model captures the security requirements of emerging distributed computing applications. We present an efficient construction of a distributed Merkle tree (DMT), which realizes an authentication tree over a p2p network, thus extending a fundamental cryptographic technique to distributed environments. We show how our DMT can be used to design an authenticated distributed hash table that is secure against replay attacks and consistent with the update history. Our scheme is built on top of a broad class of existing p2p overlay networks and achieves generality by using only the basic functionality of object location. We use this scheme to design the first efficient distributed authenticated dictionary.
UR - http://www.scopus.com/inward/record.url?scp=38049055338&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=38049055338&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-72738-5_23
DO - 10.1007/978-3-540-72738-5_23
M3 - Conference contribution
AN - SCOPUS:38049055338
SN - 9783540727378
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 354
EP - 372
BT - Applied Cryptography and Network Security - 5th International Conference, ACNS 2007, Proceedings
T2 - 5th International Conference on Applied Cryptography and Network Security, ACNS 2007
Y2 - 5 June 2007 through 8 June 2007
ER -