19
Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal, vol. 8, issue. 6, pp. 887-894 Speaker: Yi-Ru Lin Date: 09/17/2010 1 National Chung Hsing University

Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,

Embed Size (px)

DESCRIPTION

INTRODUCTION 3 Two types of DRM mechanism FBST (Fair Blind Signature Trust)

Citation preview

Page 1: Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,

Fair Blind Signature Based Authentication for Super Peer P2P Network

Authors: Xiaoliang Wang and Xingming SunSource: 2009, Information Technology Journal, vol. 8, issue. 6, pp. 887-894Speaker: Yi-Ru LinDate: 09/17/2010

1

National Chung Hsing University

Page 2: Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,

Outline

IntroductionRelated workProposed schemeSecurity analysisComment

2

Page 3: Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,

INTRODUCTION

3

Two types of DRM mechanismFBST (Fair Blind Signature Trust)

Page 4: Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,

Protect mechanismTrace mechanism

Two types of DRM mechanism

4

Page 5: Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,

Identity authenticityTraceabilityPrivacy protectionResilience to a large number of peer

FBST (Fair Blind Signature Trust)

5

Page 6: Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,

RELATED WORKS

6

Fair blind signatureShamir secret sharing

Page 7: Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,

7

Related work – Fair blind signatureSender, Signer, Trusted entity

Sender

TrustedEntity

SignerBlind Signature

Message- signature pair Signature record

Trace

Trace

Page 8: Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,

8

Proposed Scheme(1/5)

Shamir’s threshold scheme

PT: prime number PT a≧ 0

t : degree of polynomial a0 : group key

Example:t=3 ; a0=1234 ; n = 6

g(x) = 94x2+166x+1234

(1,1494);(2,1942);(3,2578);(4,3402);(5,4414);(6,5614)

g(x)

= 94x2+166x+1234

g(0) = 1234

Page 9: Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,

9

Content DistributionGaussian elimination (高斯消去法 )

In the block, Music provider generates k(k>t) different UID value and distributes them in the p2p network. (UID, h0(UID))

Example H0(UID)’=a+b(UID)’H0(UID)’’=a+b(UID)’ ‘

2x+y-z=8-3x-y+2z=-11-2x+y+2z=-3

2 1 -1 | 8-3 -1 2 | -11-2 1 2 | -3

2 1 -1 | 8 0 1/2 1/2 | 1 0 0 -1 | 1

1 0 0 | 2 0 1 0 | 3 0 0 1 | -1

Assumption UID’=3, UID’’=2, H0(UID)’=10, and H0(UID)’’=5 10=a+3b 5=a+2b a=-5, b=5 => H0(UID)= -5+5(UID)

Page 10: Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,

10

Related work – Shamir secret sharing

Page 11: Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,

PROPOSED SCHEME

11

InitializationLocal signatureThreshold pair sharingAnonymous and authentication communicationTrace malicious peer

Page 12: Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,

12

Initialization

RP

u

SP

Choose: n=pqRSA-like keys:Public: ePrivate: de·d= 1(mod(p-1) ·(q-1))Secure hash function h(·)Publish:(e, n), h(·)

Choose:SRP(·)

Choose:Su(·)

hu(·)

……………

hx(·)………..

ID Hash function

u hu(·)

Page 13: Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,

13

Local signature

RP

u

SP

Page 14: Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,

14

Threshold pair sharing

RP

u

SP

Page 15: Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,

15

Anonymous and authentication communication

RP

u

SP

Page 16: Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,

16

Trace malicious peer

RP

u

SP

Page 17: Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,

SECURITY ANALYSIS

17

Fundamental security objectivesImpersonateTamperPeer compromiseAnonymityTraceability

Page 18: Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,

18

Comments

Page 19: Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,

19

Thanks for your listening