© The Institution of Engineering and Technology
In a group-based trust management scheme, peers are partitioned into groups based on chosen characteristics, such as location and interest. The super peer (SP), who is responsible for the storage and distribution of reputation value, has an important role in group-based trust management. Thus, if the SP is a disguised or malicious peer, serious security problems could occur. To solve these security problems, the authors propose a traceable, group-oriented, signature scheme with multiple signing policies for trust management. The SP's signature is generated by a designated group called the signature group. In the authors scheme, peers in the signature group will decide whether to generate the signature for the SP based on the SP's reputation, meaning that attackers cannot forge a valid signature. In addition, an outsider also can trace the signers who were involved in generating the signature for reputation valuation.
References
-
-
1)
-
25. Carlo, B., Alfredo, D.S., Giovanni, D.C., Antonio, G.G., Ugo, V.: ‘Multi-secret sharing schemes’. Adv. Cryptology – CRYPTO'94, 1994, pp. 150–163.
-
2)
-
14. Tseng, Y.M., Jan, J.K.: ‘Attacks on threshold signature schemes with traceable signers’, Inf. Proc. Lett., 1991, 71, pp. 1–4 (doi: 10.1016/S0020-0190(99)00078-2).
-
3)
-
8. Tian, H.R., Zou, S.H., Wang, W.D., Cheng, S.D.: ‘A hierarchical reputation model for P2P networks’, J. Electron. Inf. Technol., 2007, 29, (11), pp. 2560–2563.
-
4)
-
11. Desmedt, Y., Frankel, Y.: ‘Shared generation of authenticators and signatures’. Advances in Cryptology – Crypto'91 Proc., 1991, pp. 458–469.
-
5)
-
21. Agnew, G.B., Mullin, R.C., Vanston, S.A.: ‘Improved digital signature scheme based on discrete exponentiation’, Electron. Lett., 1990, 26, (14), pp. 1024–1025 (doi: 10.1049/el:19900663).
-
6)
-
17. Lee, N.Y.: ‘Threshold signature scheme with multiple signing policies’, IEE Proc., Comput. Digit. Tech., 2001, 148, (2), pp. 95–99.
-
7)
-
2. Josang, A., Ismail, R., Boyd, C.: ‘A survey of trust and reputation systems for online service provision’, Decis. Support Syst., 2007, 43, (2), pp. 618–644 (doi: 10.1016/j.dss.2005.05.019).
-
8)
-
16. Li, Z.C., Zhang, J.M., Luo, J., Song, W., Dai, Y.Q.: ‘Group-oriented (t, n) threshold digital signature schemes with traceable signers’. ISEC 2001, 2001, pp. 57–69.
-
9)
-
23. Harn, L., Xu, Y.: ‘Design of generalized ElGamal type digital signature schemes based on discrete logarithm’, Electron. Lett., 1994, 24, (31), pp. 2025–2026 (doi: 10.1049/el:19941398).
-
10)
-
12. Harn, L.: ‘Group-oriented (t, n) threshold signature and digital multi-signature’, IEE Proc. Comput. Digit. Tech., 1994, vol. 141, no5, pp. 307–313.
-
11)
-
5. Ji, M., Mehmet, A.O.: ‘Trust management and trust theory revision’, IEEE Trans. Syst. Man Cybern., 2006, , 36, (3), pp. 451–460 (doi: 10.1109/TSMCA.2006.871628).
-
12)
-
1. Josang, A., Ismail, R.: ‘The beta reputation system’. Proc. 15th Bled Conf. on Electronic Commerce, June 2002.
-
13)
-
19. Li, C., Hwang, T., Lee, N.: ‘Threshold multi-signature schemes where suspected forgery implies traceability of adversarial shareholders’. Advances in Cryptology – Proc. EUROCRYPT 94, 1994, pp. 413–419.
-
14)
-
15. Li, Z.C., Hui, L.C.K., Chow, K.P., Chong, C.F., Tsang, W.W., Chan, H.W.: ‘Security of Wang et al.’s group-oriented (t, n) threshold signature schemes with traceable signers’, Inf. Proc. Lett., 2001, 80, pp. 295–298 (doi: 10.1016/S0020-0190(01)00179-X).
-
15)
-
22. ElGamal, Y.: ‘A public key cryptosystem and a signature scheme based on discrete logarithms’, IEEE Trans., 1985, IT-31, pp. 469–472.
-
16)
-
13. Wang, C.T., Lin, C.H., Chang, C.C.: ‘Threshold signature schemes with traceable signers in group communications’, Comput. Commun., 1998, 21, (8), pp. 771–776 (doi: 10.1016/S0140-3664(98)00142-X).
-
17)
-
7. Li, X., Ling, L.: ‘PeerTrust: supporting reputation-based trust in peer-to-peer electronic communities’, IEEE Trans. Data Knowl. Eng., 2004, 16, (7), pp. 843–857 (doi: 10.1109/TKDE.2004.1318566).
-
18)
-
3. Ries, S.: ‘Trust in ubiquitous computing’. , Technische University Darmstadt, 2009.
-
19)
-
6. Trung, D.H., Nicholas, R.J., Nigel, R.S.: ‘An integrated trust and reputation model for open multi-agent systems’, Auton. Agents Multi-Agent Syst., 2006, 13, (2), pp. 119–154 (doi: 10.1007/s10458-005-6825-4).
-
20)
-
24. Karchmer, M., Wigderson, A.: ‘On span programs’. Proc. Eighth Annual Conf. on Structure in Complexity, San Diego, CA, May 1993, pp. 102–111.
-
21)
-
4. Blaze, M., Feigenbaum, J., Lacy, J.: ‘Decentralized trust management’. Proc. 17th Symp. on Security and Privacy, Oakland, CA, USA, 1996, pp. 164–173.
-
22)
-
20. Hsu, C.F., Cheng, Q., Tang, X., Zeng, B.: ‘An ideal multi-secret sharing scheme based on MSP’, Inf. Sc., 2011, 181, (7), pp. 1403–1409 (doi: 10.1016/j.ins.2010.11.032).
-
23)
-
18. Shao, J., Cao, Z.: ‘A traceable threshold signature scheme with multiple signing policies’, Comput. Secur., 2006, 25, (3), pp. 201–206 (doi: 10.1016/j.cose.2005.11.006).
-
24)
-
10. Liu, N., Li, J.H., Hao, L.M., Wu, Y., Yi, P.: ‘Group-based trust model in P2P system based on trusted computing’. Int. Conf. on Computer Science and Software Engineering, 2008, pp. 797–801.
-
25)
-
25. Carlo, B., Alfredo, D.S., Giovanni, D.C., Antonio, G.G., Ugo, V.: ‘Multi-secret sharing schemes’. Adv. Cryptology – CRYPTO'94, 1994, pp. 150–163.
-
26)
-
9. Tian, C.Q., Jiang, J.H., Hu, Z.G., Li, F.: ‘A novel super-peer based trust model for peer-to-peer networks’, Chin. J. Comput., 2010, 33, (2), pp. 345–355 (doi: 10.3724/SP.J.1016..2010.00345).
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2012.0350
Related content
content/journals/10.1049/iet-ifs.2012.0350
pub_keyword,iet_inspecKeyword,pub_concept
6
6