Distributed authentication for peer-to-peer networks

S. Gokhale, Partha Dasgupta

Research output: Chapter in Book/Report/Conference proceedingConference contribution

26 Scopus citations


A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in networks. Ad-hoc networks are formed in a haphazard manner. Security services for ad-hoc networks cannot assume the existence of a particular infrastructure. Peer-to-peer technology is promising in addressing security issues in ad-hoc networks. We provide a novel; cryptographically secure representation of trust based on secure groups - troupes. We show how troupes can be constructed in a distributed manner using RSA accumulators. Troupe-membership is verified using the zero-knowledge protocol of modular exponentiation. Each node in a group has an identity within a group, but it is not required to reveal the identity during verification. This trust model is not centrally controlled and can be deployed incrementally in the network. This paper presents protocols and a prototype implementation of the troup based authentication system.

Original languageEnglish (US)
Title of host publicationProceedings - 2003 Symposium on Applications and the Internet Workshops, SAINT 2003
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages7
ISBN (Print)0769518737, 9780769518732
StatePublished - 2003
Event2003 Symposium on Applications and the Internet Workshops, SAINT 2003 - Orlando, United States
Duration: Jan 27 2003Jan 31 2003


Other2003 Symposium on Applications and the Internet Workshops, SAINT 2003
Country/TerritoryUnited States


  • Ad hoc networks
  • Authentication
  • Centralized control
  • Costs
  • Cryptographic protocols
  • Network topology
  • Peer to peer computing
  • Prototypes
  • Public key
  • Public key cryptography

ASJC Scopus subject areas

  • Computer Networks and Communications


Dive into the research topics of 'Distributed authentication for peer-to-peer networks'. Together they form a unique fingerprint.

Cite this