Font Size: a A A

Study On Security Of Reputation System In Peer-to-Peer Networks

Posted on:2006-06-05Degree:MasterType:Thesis
Country:ChinaCandidate:H ZhaoFull Text:PDF
GTID:2168360152971673Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the thorough study and broad applications of Peer-to-Peer technology, the study of reputation system in Peer-to-Peer networks has been paid much attention to. Security is one of the key problems in reputation system. This thesis studies the security of reputation system in Peer-to-Peer networks. Chapter one introduces the background, signification and status in quo of study, and indicates that the study of security of reputation system is the keystone of the thesis. In chapter two, the basal concept and mode of Peer-to-Peer is introduced, the mode of Peer-to-Peer is compared with the mode of client/service, and the applications, status in quo of study and the future of Peer-to-Peer technology is analyzed. In chapter three, the systems and technologies of cryptology used in this thesis are presented in detailed. In chapter four, the security of reputation system in Peer-to-Peer networks is studied, and a secure and efficient reputation system in Peer-to-Peer networks is put forward. In the last chapter, the applications of reputation system in Peer-to-Peer networks are analyzed and applied concretely to the problem of building the trust proxy in delegation decryption of Peer-to-Peer networks. The main work in this thesis is as follows: 1 The characters of Peer-to-Peer networks are analyzed; the mode of Peer-to-Peer is compared with the mode of client/service, and the result shows that the mode of Peer-to-Peer has obvious advantages in many aspects and some inferior positions; the applications, status in quo of study and future of Peer-to-Peer technology is analyzed. 2 Aiming at the problems of privacy, authentication, integrity, repudiation, collusion, real-time and efficiency, a secure and efficient reputation system is brought forward by applying the systems and technologies of cryptology, which guarantee the security of reputation system. 3 The applications of reputation system are studied in Peer-to-Peer networks. It is applied concretely to the problem of building the trust proxy in delegation decryption in Peer-to-Peer networks, and a scheme of building a trust proxy based on reputation system is presented firstly.
Keywords/Search Tags:Peer-to-Peer networks, Reputation system, Secure and efficient, Trust proxy
PDF Full Text Request
Related items