Hash-based distributed public key infrastructure for ubiquitous environments

Atushi Takeda*, Seiya Nakayama, Gen Kitagata, Debasish Chakraborty, Kazuo Hashimoto, Norio Shiratori

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In ubiquitous environments, there are a huge number of computer nodes which provide a lot of information services via the Internet. Therefore, a secure communication system is required for ubiquitous environments. In this paper, we propose a new architecture of distributed public key infrastructure, named as Hash-based Distributed Public Key Infrastructure (HDPKI). A HDPKI system achieves a scalable management of public key certificates by using Distributed Hash Table. Additionally, it is easy to use a HDPKI system, because we can register our public key certificates automatically. In this paper, we show scalability of HDPKI through computer simulation. According to these results, the total amount of required messages for certificate management in a HDPKI system is O(log n) where n is the number of nodes.

Original languageEnglish
Title of host publication4th International Conference on Complex, Intelligent and Software Intensive Systems, CISIS-2010
Pages376-383
Number of pages8
DOIs
Publication statusPublished - 2010 May 31
Externally publishedYes
Event4th International Conference on Complex, Intelligent and Software Intensive Systems, CISIS-2010 - Krakow, Poland
Duration: 2010 Feb 152010 Feb 18

Publication series

NameCISIS 2010 - The 4th International Conference on Complex, Intelligent and Software Intensive Systems

Conference

Conference4th International Conference on Complex, Intelligent and Software Intensive Systems, CISIS-2010
Country/TerritoryPoland
CityKrakow
Period10/2/1510/2/18

Keywords

  • Distributed hash table
  • Overlay network
  • Peer-to-peer network
  • Public key infrastructure

ASJC Scopus subject areas

  • Artificial Intelligence
  • Software

Fingerprint

Dive into the research topics of 'Hash-based distributed public key infrastructure for ubiquitous environments'. Together they form a unique fingerprint.

Cite this