An Efficient and Secure Code Sharing for Peer-to-Peer Communications

Code sharing is a popular but high risk activity in computing network communications. It is hard to determine if a piece of code contains malicious action. The existing approaches mainly focus on the traditional centralized network model and are not suitable for the peer-to-peer (P2P) code sharing. In this paper, we propose a secured code sharing system which establishes an efficient P2P sharing channel and attests the identity of the shared code. The risk of importing malicious code can be reduced by accepting software with valid identity. Moreover, the system is feasible to be adopted on mobile devices with limited resources

[1]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[2]  Bala Srinivasan,et al.  A secure account-based mobile payment protocol , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[3]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[4]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[5]  Bala Srinivasan,et al.  A Limited-Used Key Generation Scheme for Internet Transactions , 2004, WISA.

[6]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.