Font Size: a A A

Application Research Of Threshold Signature Scheme In P2P E-commence

Posted on:2008-12-28Degree:MasterType:Thesis
Country:ChinaCandidate:F GaoFull Text:PDF
GTID:2178360212475629Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
P2P network is a distributed system architecture with high scalability , it has broken the traditional Client / Server(C/S) model. The centralized management model of internet was changed into decentralized management model, because of P2P. Each peer of the network has equal status, i.e., each peer is acting as a server to provide services to other peers, but also to enjoy the services provided by other peers, therefore P2P takes full advantage of capacity and potential resources of the terminal peers on the internet.As P2P networks provide unprecedented freedom and convenience for users, it has been widely used in many fields, P2P e-commerce is one of the emerging applications. This paper analyzes the current state of e-commerce development, and introduces many security problems in the new area of growth P2P e-commerce. We can concluded that there are many issues in security, feasibility and efficiency etc, through research on the application of classical algorithm and security scheme in the P2P e-commerce, therefore , we put forward a new scheme that apply threshold signature to authentication and authorization.JXTA is an open network computing platform which is used to solve P2P computing, it defines a set of XML protocols, these protocols were designed to provide general services for the dynamic network which was consisted of large number of peers. JXTA is independent of operating system, programming language and network transmission protocol. Because JXTA have so many excellent characteristics, this paper focuses on the application of threshold signature scheme in P2P e-commerce on the basis of JXTA.Based on JXTA, P2P E-commence situation grounding upon loosely consistent DHT are lack of trusted center and existing a lot of malicious peers, so it is necessary for the system to introduce the credible analysis for new peer .An authentication and access control scheme applying RSA and DSA threshold algorithm is proposed. This scheme is suitable for dynamic network, and can resist many kinds of attack from malicious peers such as the conspiracy attack. It is theoretically proved that the security of system is enhanced. Simulation results indicate that the efficiency of peer recognition and the accuracy of authentication are increased. Simultaneously, threshold RSA is compared with threshold DSA in terms of through efficiency by experiment. The study of this paper laid a foundation forlarge-scale commerce application of P2P e-commerce .During the process of design, we solved many problems, such as, the network topology, shuttle firewall and so on.
Keywords/Search Tags:P2P, E-commerce, JXTA, threshold signature, authentication scheme, conspiracy attack
PDF Full Text Request
Related items