2004
DOI: 10.1145/984334.984338
|View full text |Cite
|
Sign up to set email alerts
|

Crypto-based identifiers (CBIDs)

Abstract: This paper addresses the identifier ownership problem. It does so by using characteristics of Statistical Uniqueness and Cryptographic Verifiability (SUCV) of certain entities which this document calls SUCV Identifiers and Addresses, or, alternatively, Crypto-based Identifiers. Their characteristics allow them to severely limit certain classes of denial-of-service attacks and hijacking attacks. SUCV addresses are particularly applicable to solve the address ownership problem that hinders mechanisms like Bindin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
39
0

Year Published

2005
2005
2012
2012

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 50 publications
(39 citation statements)
references
References 22 publications
0
39
0
Order By: Relevance
“…For unique and unforgeable ID assignment, we propose to use a solution based on Crypto-Based ID (CBID) [16]: The id i is chosen by the node itself from an ephemeral public/private key pair. More specifically, the node computes id i as follows: id i = H 64 (P K i |N ID), where P K i is M i 's temporary public key or DH public key y i in our schemes, N ID is the network identifier and H 64 (·) a 64-bit long hash function.…”
Section: Discussionmentioning
confidence: 99%
“…For unique and unforgeable ID assignment, we propose to use a solution based on Crypto-Based ID (CBID) [16]: The id i is chosen by the node itself from an ephemeral public/private key pair. More specifically, the node computes id i as follows: id i = H 64 (P K i |N ID), where P K i is M i 's temporary public key or DH public key y i in our schemes, N ID is the network identifier and H 64 (·) a 64-bit long hash function.…”
Section: Discussionmentioning
confidence: 99%
“…Apart from digital signatures, CBJX provides an additional lightweight authenticity method by using Crypto-Based Identifiers (CBIDs (Montenegro and Castelluccia, 2004)), which will be discussed in Section 3. At this point, only notice that this method provides authentic messaging without the need of certificates issued by a TTP (Trusted Third Party).…”
Section: Xml Listing 2 -Cbjx Crypto-information Xml Schemamentioning
confidence: 99%
“…However, we believe the basis of any security mechanism in P2P overlays are strong and verifiable node identities. We are currently exploring the use of crypto-based IDs [19] for our infrastructure. We are also investigating the use of Threshold Cryptography [18] to implement a distributed admission control mechanism.…”
Section: Future Workmentioning
confidence: 99%