An authentication protocol without trusted third party on P2P network

@article{Zhou2010AnAP,
  title={An authentication protocol without trusted third party on P2P network},
  author={Yonghong Zhou and Huaiqing Lin},
  journal={2010 2nd International Conference on Future Computer and Communication},
  year={2010},
  volume={2},
  pages={V2-686-V2-689}
}
A CLK-Based secure authentication protocol is proposed which provides the anonymity and the ability to store data securely. The trusted third party (key information center) is not needed when the secure network system is set up. The protocol avoids the escrow problem inidentity-based cryptosystem and the secure delivery of private keys. The security of… CONTINUE READING