Download PDFOpen PDF in browser

On Designing Secured Communication Protocols along with Anonymity for CRT based Structured P2P Network Architecture

10 pagesPublished: June 9, 2021

Abstract

In this work, we have considered designing secured communication protocols for Chinese remainder theorem based structured p2p architecture. Such an architecture has been the choice because of the complexity in Inter or Intra group communications are just O(1) [16]. In this work, we have considered efficient way to make the already existing communication protocols [16] secured. We have extended these protocols further to include anonymity. We have considered security separately for multicasting inside a group and multicasting outside the group.

Keyphrases: anonymity, chinese remainder theorem, cryptography, overlay multicast, security, structured p2p network

In: Yan Shi, Gongzhu Hu, Takaaki Goto and Quan Yuan (editors). CAINE 2020. The 33rd International Conference on Computer Applications in Industry and Engineering, vol 75, pages 59-68.

BibTeX entry
@inproceedings{CAINE2020:Designing_Secured_Communication_Protocols,
  author    = {Koushik Maddali and Swathi Kaluvakuri and Nick Rahimi and Bidyut Gupta and Narayan Debnath},
  title     = {On Designing Secured Communication Protocols along with Anonymity for CRT based Structured P2P Network Architecture},
  booktitle = {CAINE 2020. The 33rd International Conference on Computer Applications  in Industry and Engineering},
  editor    = {Yan Shi and Gongzhu Hu and Takaaki Goto and Quan Yuan},
  series    = {EPiC Series in Computing},
  volume    = {75},
  publisher = {EasyChair},
  bibsource = {EasyChair, https://easychair.org},
  issn      = {2398-7340},
  url       = {/publications/paper/FKsf},
  doi       = {10.29007/cfc9},
  pages     = {59-68},
  year      = {2021}}
Download PDFOpen PDF in browser