2nd International ICST Workshop on e-Forensics Law and Judicial

Research Article

An Anonymity Scheme Based on Pseudonym in P2P Networks

Download
470 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-23602-0_28,
        author={Hao Peng and Songnian Lu and Jianhua Li and Aixin Zhang and Dandan Zhao},
        title={An Anonymity Scheme Based on Pseudonym in P2P Networks},
        proceedings={2nd International ICST Workshop on e-Forensics Law and Judicial},
        proceedings_a={E-FORENSICSLAW},
        year={2012},
        month={10},
        keywords={anonymous P2P networks pseudonym},
        doi={10.1007/978-3-642-23602-0_28}
    }
    
  • Hao Peng
    Songnian Lu
    Jianhua Li
    Aixin Zhang
    Dandan Zhao
    Year: 2012
    An Anonymity Scheme Based on Pseudonym in P2P Networks
    E-FORENSICSLAW
    Springer
    DOI: 10.1007/978-3-642-23602-0_28
Hao Peng1,*, Songnian Lu1,*, Jianhua Li1,*, Aixin Zhang1,*, Dandan Zhao1,*
  • 1: Shanghai Jiao Tong University
*Contact email: penghao2007@sjtu.edu.cn, snlu@sjtu.edu.cn, lijh888@sjtu.edu.cn, axzhang@sjtu.edu.cn, zhaodandan@sjtu.edu.cn

Abstract

One of the fundamental challenges in P2P (Peer to Peer) networks is to protect peers’ identity privacy. Adopting anonymity scheme is a good choice in most of networks such as the Internet, computer and communication networks. In this paper, we proposed an anonymity scheme based on pseudonym in which peers are motivated not to share their identity. Compared with precious anonymous scheme such as RuP (Reputation using Pseudonyms), our scheme can reduce the overhead and minimize the trusted center’s involvement.