메뉴 건너뛰기




Volumn 410, Issue 6-7, 2009, Pages 453-466

Robust random number generation for peer-to-peer systems

Author keywords

Join leave attacks; Peer to peer systems; Random number generation

Indexed keywords

ALGORITHMS; CLIENT SERVER COMPUTER SYSTEMS; DISTRIBUTED COMPUTER SYSTEMS; NUMBER THEORY; OVERLAY NETWORKS; PARALLEL ALGORITHMS; PARALLEL ARCHITECTURES; TELECOMMUNICATION NETWORKS;

EID: 58549113189     PISSN: 03043975     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.tcs.2008.10.003     Document Type: Article
Times cited : (22)

References (34)
  • 1
    • 0038416064 scopus 로고    scopus 로고
    • J. Aspnes, G. Shah, Skip graphs, in: Proc. of the 14th ACM Symp. on Discrete Algorithms, SODA, 2003, pp. 384-393
    • J. Aspnes, G. Shah, Skip graphs, in: Proc. of the 14th ACM Symp. on Discrete Algorithms, SODA, 2003, pp. 384-393
  • 2
    • 58549103068 scopus 로고    scopus 로고
    • B. Awerbuch, C. Scheideler, Group Spreading: A protocol for provably secure distributed name service, in: Proc. of the 31st International Colloquium on Automata, Languages and Programming, ICALP, 2004
    • B. Awerbuch, C. Scheideler, Group Spreading: A protocol for provably secure distributed name service, in: Proc. of the 31st International Colloquium on Automata, Languages and Programming, ICALP, 2004
  • 3
    • 58549085931 scopus 로고    scopus 로고
    • B. Awerbuch, C. Scheideler, Robust distributed name service, in: Proc. of the 3rd International Workshop on Peer-to-Peer Systems, IPTPS, 2004
    • B. Awerbuch, C. Scheideler, Robust distributed name service, in: Proc. of the 3rd International Workshop on Peer-to-Peer Systems, IPTPS, 2004
  • 4
    • 33749571809 scopus 로고    scopus 로고
    • B. Awerbuch, C. Scheideler, Towards a scalable and robust DHT, in: Proc. of the 18th ACM Symp. on Parallel Algorithms and Architectures, SPAA, 2006. See also http://www14.in.tum.de/personen/scheideler
    • B. Awerbuch, C. Scheideler, Towards a scalable and robust DHT, in: Proc. of the 18th ACM Symp. on Parallel Algorithms and Architectures, SPAA, 2006. See also http://www14.in.tum.de/personen/scheideler
  • 5
    • 85008184918 scopus 로고    scopus 로고
    • M. Ben-Or, B. Kelmer, T. Rabin, Asynchronous secure computations with optimal resilience, in: Proc. of the 13th ACM Symp. on Principles of Distributed Computing, PODC, 1994, pp. 183-192
    • M. Ben-Or, B. Kelmer, T. Rabin, Asynchronous secure computations with optimal resilience, in: Proc. of the 13th ACM Symp. on Principles of Distributed Computing, PODC, 1994, pp. 183-192
  • 6
    • 58549113328 scopus 로고    scopus 로고
    • M. Castro, P. Druschel, A. Ganesh, A. Rowstron, D. Wallach, Security for structured peer-to-peer overlay networks, in: Proc. of the 5th Usenix Symp. on Operating Systems Design and Implementation, OSDI, 2002
    • M. Castro, P. Druschel, A. Ganesh, A. Rowstron, D. Wallach, Security for structured peer-to-peer overlay networks, in: Proc. of the 5th Usenix Symp. on Operating Systems Design and Implementation, OSDI, 2002
  • 7
    • 58549110406 scopus 로고    scopus 로고
    • M. Castro, B. Liskov, Practical Byzantine fault tolerance, in: Proc. of the 2nd Usenix Symp. on Operating Systems Design and Implementation, OSDI, 1999
    • M. Castro, B. Liskov, Practical Byzantine fault tolerance, in: Proc. of the 2nd Usenix Symp. on Operating Systems Design and Implementation, OSDI, 1999
  • 8
    • 85010849899 scopus 로고    scopus 로고
    • Denial of service via algorithmic complexity attacks
    • Crosby S., and Wallach D. Denial of service via algorithmic complexity attacks. Usenix Security (2003)
    • (2003) Usenix Security
    • Crosby, S.1    Wallach, D.2
  • 9
    • 58549116668 scopus 로고    scopus 로고
    • J.R. Douceur, The sybil attack, in: Proc. of the 1st International Workshop on Peer-to-Peer Systems, IPTPS, 2002
    • J.R. Douceur, The sybil attack, in: Proc. of the 1st International Workshop on Peer-to-Peer Systems, IPTPS, 2002
  • 10
    • 58549115025 scopus 로고    scopus 로고
    • D. Dubhashi, A. Panconesi, Concentration of measure for the analysis of randomized algorithms, Unpublished manuscript. Accessible via http://www.cs.unibo.it/~pancones/papers.html, October 20, 1998
    • D. Dubhashi, A. Panconesi, Concentration of measure for the analysis of randomized algorithms, Unpublished manuscript. Accessible via http://www.cs.unibo.it/~pancones/papers.html, October 20, 1998
  • 11
    • 58549099438 scopus 로고    scopus 로고
    • A. Fiat, J. Saia, M. Young, Making chord robust to Byzantine attacks, in: Proc. of the European Symposium on Algorithms, ESA, 2005
    • A. Fiat, J. Saia, M. Young, Making chord robust to Byzantine attacks, in: Proc. of the European Symposium on Algorithms, ESA, 2005
  • 12
    • 0003649439 scopus 로고    scopus 로고
    • Springer-Verlag
    • Goldreich O. Modern Cryptography, Probabilistic Proofs and Pseudorandomness. Algorithms and Combinatorics vol. 17 (1998), Springer-Verlag
    • (1998) Algorithms and Combinatorics , vol.17
    • Goldreich, O.1
  • 13
    • 58549098214 scopus 로고    scopus 로고
    • S. Halevi, S. Micali, Practical and provably-secure commitment schemes from collision-free hashing, in: CRYPTO 96, 1996, pp. 201-215
    • S. Halevi, S. Micali, Practical and provably-secure commitment schemes from collision-free hashing, in: CRYPTO 96, 1996, pp. 201-215
  • 14
    • 0030704545 scopus 로고    scopus 로고
    • D. Karger, E. Lehman, T. Leighton, M. Levine, D. Lewin, R. Panigrahi, Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the World Wide Web, in: 29th ACM Symp. on Theory of Computing, STOC, 1997, pp. 654-663
    • D. Karger, E. Lehman, T. Leighton, M. Levine, D. Lewin, R. Panigrahi, Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the World Wide Web, in: 29th ACM Symp. on Theory of Computing, STOC, 1997, pp. 654-663
  • 15
    • 38049008242 scopus 로고    scopus 로고
    • V. King, J. Saia, V. Sanwalani, E. Vee, Towards a secure and scalable computation in peer-to-peer networks, in: Proc. of the 47th IEEE Symp. on Foundations of Computer Science, FOCS, 2006
    • V. King, J. Saia, V. Sanwalani, E. Vee, Towards a secure and scalable computation in peer-to-peer networks, in: Proc. of the 47th IEEE Symp. on Foundations of Computer Science, FOCS, 2006
  • 16
    • 58549095212 scopus 로고    scopus 로고
    • F. Kuhn, S. Schmid, R. Wattenhofer, A self-repairing peer-to-peer system resilient to dynamic adversarial churn, in: Proc. of the 4th International Workshop on Peer-to-Peer Systems, IPTPS, 2005
    • F. Kuhn, S. Schmid, R. Wattenhofer, A self-repairing peer-to-peer system resilient to dynamic adversarial churn, in: Proc. of the 4th International Workshop on Peer-to-Peer Systems, IPTPS, 2005
  • 18
    • 0000672724 scopus 로고    scopus 로고
    • Concentration
    • Habib M., McDiarmid C., Ramirez-Alfonsin J., and Reed B. (Eds), Springer Verlag, Berlin
    • McDiarmid. Concentration. In: Habib M., McDiarmid C., Ramirez-Alfonsin J., and Reed B. (Eds). Probabilistic Methods for Algorithmic Discrete Mathematics (1998), Springer Verlag, Berlin 195-247
    • (1998) Probabilistic Methods for Algorithmic Discrete Mathematics , pp. 195-247
    • McDiarmid1
  • 19
    • 0001448484 scopus 로고
    • Bit commitment using pseudorandomness
    • Naor M. Bit commitment using pseudorandomness. Journal of Cryptology 4 2 (1991) 151-158
    • (1991) Journal of Cryptology , vol.4 , Issue.2 , pp. 151-158
    • Naor, M.1
  • 20
    • 0037703386 scopus 로고    scopus 로고
    • M. Naor, U. Wieder, Novel architectures for P2P applications: The continuous-discrete approach, in: Proc. of the 15th ACM Symp. on Parallel Algorithms and Architectures, SPAA, 2003
    • M. Naor, U. Wieder, Novel architectures for P2P applications: The continuous-discrete approach, in: Proc. of the 15th ACM Symp. on Parallel Algorithms and Architectures, SPAA, 2003
  • 21
    • 58549106531 scopus 로고    scopus 로고
    • S. Nielson, S. Crosby, D. Wallach, Kill the messenger: A taxonomy of rational attacks, in: Proc. of the 4th International Workshop on Peer-to-Peer Systems, IPTPS, 2005
    • S. Nielson, S. Crosby, D. Wallach, Kill the messenger: A taxonomy of rational attacks, in: Proc. of the 4th International Workshop on Peer-to-Peer Systems, IPTPS, 2005
  • 22
    • 0030652065 scopus 로고    scopus 로고
    • G. Plaxton, R. Rajaraman, A.W. Richa, Accessing nearby copies of replicated objects in a distributed environment, in: Proc. of the 9th ACM Symp. on Parallel Algorithms and Architectures, SPAA, 1997, pp. 311-320
    • G. Plaxton, R. Rajaraman, A.W. Richa, Accessing nearby copies of replicated objects in a distributed environment, in: Proc. of the 9th ACM Symp. on Parallel Algorithms and Architectures, SPAA, 1997, pp. 311-320
  • 23
    • 58549094876 scopus 로고    scopus 로고
    • H.V. Ramasamy, C. Cachin, Parsimonious asynchronous Byzantine-fault-tolerant atomic broadcast, in: 9th Conference on Principles of Distributed Systems, OPODIS, 2005, pp. 88-102
    • H.V. Ramasamy, C. Cachin, Parsimonious asynchronous Byzantine-fault-tolerant atomic broadcast, in: 9th Conference on Principles of Distributed Systems, OPODIS, 2005, pp. 88-102
  • 24
    • 85091111009 scopus 로고    scopus 로고
    • S. Rhea, D. Geels, T. Roscoe, J. Kubiatowicz, Handling churn in a DHT, in: USENIX Annual Technical Conference, 2004
    • S. Rhea, D. Geels, T. Roscoe, J. Kubiatowicz, Handling churn in a DHT, in: USENIX Annual Technical Conference, 2004
  • 25
    • 58549095616 scopus 로고    scopus 로고
    • T. Ritter, RNG implementations: A literature survey. http://www.ciphersbyritter.com/RES/RNGENS.HTM
    • T. Ritter, RNG implementations: A literature survey. http://www.ciphersbyritter.com/RES/RNGENS.HTM
  • 26
    • 58549090083 scopus 로고    scopus 로고
    • J. Saia, A. Fiat, S. Gribble, A. Karlin, S. Saroiu, Dynamically fault-tolerant content addressable networks, in: Proc. of the 1st International Workshop on Peer-to-Peer Systems, IPTPS, 2002
    • J. Saia, A. Fiat, S. Gribble, A. Karlin, S. Saroiu, Dynamically fault-tolerant content addressable networks, in: Proc. of the 1st International Workshop on Peer-to-Peer Systems, IPTPS, 2002
  • 27
    • 58549096470 scopus 로고    scopus 로고
    • C. Scheideler, Probabilistic methods for coordination problems, HNI-Verlagsschriftenreihe 78, University of Paderborn, 2000. See also http://www14.in.tum.de/personen/scheideler
    • C. Scheideler, Probabilistic methods for coordination problems, HNI-Verlagsschriftenreihe 78, University of Paderborn, 2000. See also http://www14.in.tum.de/personen/scheideler
  • 28
    • 27144447960 scopus 로고    scopus 로고
    • C. Scheideler, How to spread adversarial nodes? Rotate! in: Proc. of the 37th ACM Symp. on Theory of Computing, STOC, 2005, pp. 704-713
    • C. Scheideler, How to spread adversarial nodes? Rotate! in: Proc. of the 37th ACM Symp. on Theory of Computing, STOC, 2005, pp. 704-713
  • 29
    • 77951438838 scopus 로고    scopus 로고
    • A. Singh, M. Castro, A. Rowstron, P. Druschel, Defending against eclipse attacks on overlay networks, in: Proc. of the 11th ACM SIGOPS European Workshop, 2004
    • A. Singh, M. Castro, A. Rowstron, P. Druschel, Defending against eclipse attacks on overlay networks, in: Proc. of the 11th ACM SIGOPS European Workshop, 2004
  • 30
    • 58549090679 scopus 로고    scopus 로고
    • E. Sit, R. Morris, Security considerations for peer-to-peer distributed hash tables, in: Proc. of 1st International Workshop on Peer-to-Peer Systems, IPTPS, 2002
    • E. Sit, R. Morris, Security considerations for peer-to-peer distributed hash tables, in: Proc. of 1st International Workshop on Peer-to-Peer Systems, IPTPS, 2002
  • 31
    • 84947784853 scopus 로고    scopus 로고
    • K. Srinathan, C.P. Rangan, Efficient asynchronous secure multiparty distributed computation, in: Proc. of the 1st Int. Conference on Progress in Cryptology, 2000, pp. 117-129
    • K. Srinathan, C.P. Rangan, Efficient asynchronous secure multiparty distributed computation, in: Proc. of the 1st Int. Conference on Progress in Cryptology, 2000, pp. 117-129
  • 32
    • 21644471550 scopus 로고    scopus 로고
    • M. Srivatsa, L. Liu, Vulnerabilities and security threats in structured overlay networks: A quantitative analysis, in: Proc. of the 20th IEEE Computer Security Applications Conference, ACSAC, 2004
    • M. Srivatsa, L. Liu, Vulnerabilities and security threats in structured overlay networks: A quantitative analysis, in: Proc. of the 20th IEEE Computer Security Applications Conference, ACSAC, 2004
  • 33
    • 58549091825 scopus 로고    scopus 로고
    • I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, H. Balakrishnan, Chord: A scalable peer-to-peer lookup service for Internet applications, in: Proc. of the ACM SIGCOMM'01, 2001. See also http://www.pdos.lcs.mit.edu/chord/
    • I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, H. Balakrishnan, Chord: A scalable peer-to-peer lookup service for Internet applications, in: Proc. of the ACM SIGCOMM'01, 2001. See also http://www.pdos.lcs.mit.edu/chord/
  • 34
    • 84944715747 scopus 로고    scopus 로고
    • J. Viega, Practical random number generation in software, in: Proc. of the 19th Annual Computer Security Applications Conference, 2003
    • J. Viega, Practical random number generation in software, in: Proc. of the 19th Annual Computer Security Applications Conference, 2003


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.