Anonymous and Distributed Authentication for Peer-to-Peer Networks
- 1 Department of Computer Engineering, University of Peradeniya, Sri Lanka
- 2 Research and Innovation Centers Division, Faculty of Resilience, Rabdan Academy, United Arab Emirates
- 3 Institute for Integrated and Intelligent Systems, Griffith University, Australia
Abstract
Well-known authentication mechanisms such as Public-key Infrastructure (PKI) and Identity-based Public-key Certificates (ID-PKC) are not suitable for integration in a Peer-to-Peer (P2P) network environment, the reason being either the lack of or the difficulty in maintaining a centralized authority to manage the certificates. Authentication becomes even harder in anonymous environments. In this study, we present three authentication protocols such that the users can authenticate themselves in an anonymous P2P network, without revealing their identities. The first protocol uses existing ring signature schemes to obtain anonymous authentication, the second is an anonymous authentication protocol utilizing secret sharing schemes, and lastly a zero-knowledge-based anonymous authentication protocol. We provide security justifications for the three aforementioned protocols in terms of anonymity, completeness, soundness, resilience to impersonation attacks, and resilience to replay attacks. We also provide examples of conceptual topologies and how the peers would behave and rearrange in case of failure.
DOI: https://doi.org/10.3844/jcssp.2023.1.10
Copyright: © 2023 Pasan Tennakoon, Supipi Karunathilaka, Rishikeshan Lavakumar and Janaka Alawatugoda. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
- 2,308 Views
- 1,209 Downloads
- 1 Citations
Download
Keywords
- Anonymous Authentication
- Peer-to-Peer Networks
- Ring Signatures
- Secret Sharing
- Zero-Knowledge
- Blockchains