Time Constraint Delegation for P2P Data Decryption
- 690 Downloads
Large amount of digital content would be stored safely in peer-to-peer network, with encrypted format. Being requested, a cipher text is downloaded from certain peer and decrypted by a delegated decryptor to obtain the clear text. Observing the need for this new kind of delegation decryption service, we propose a novel time constraint delegation scheme for decrypting p2p data in this paper. The new features of the delegation scheme are that: it uses a flexible secure mobile agent solution without designated delegation server; the time constraint conditional parameter is clearly bound with the protocols; and the computation complexity is greatly reduced by replacing public key computation with hash function. We elaborate the protocol design as well as its security, extensions and properties. Potential applications in content delivery network and pervasive computing scenarios are depicted.
KeywordsMobile Agent Proxy Signature Replay Attack Proxy Server Content Delivery Network
Unable to display preview. Download preview PDF.
- 1.Akamai technologies Inc. EdgeSuite product, http://www.akamai.com
- 3.NIST FIPS PUB 180. Secure Hash Standard. NIST (May 1993)Google Scholar
- 6.Mambo, M., Okamoto, E.: Proxy cryptosystems: Delegation of the power to decrypt ciphertexts. IEICE Trans. Fund. Electronics Communications and Comp. Sci. E80-A/1, 54–63 (1997)Google Scholar
- 9.Horne, B., Pinkas, B., Sander, T.: Escrow services and incentives in peer-to-peer networks. In: Proc. of ACM EC 2001 (2001)Google Scholar
- 11.Graf, M.: Demo: Fluid computing. In: First International Conference, Pervasive 2002, Zürich, Switzerland, August 26-28 (2002)Google Scholar
- 12.OceanStore project, http://oceanstore.cs.berkeley.edu
- 14.Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: delegation of the power to sign messages. IEICE Trans. Fund. of Electronic Communications and Comp Sci. E79-A/9, 1338–1354 (1996)Google Scholar