6 research outputs found

    A Secured Agent-based Model for a Peer-to-Peer System

    Get PDF
    In this paper, information exchange that is devoid of control in the peer-to-peer communication, exposes peer to malicious activities, insecure communication, loss of significant data or failure of the system. The complexity and perceived compromise in peers communicating at different levels necessitates modeling a secured agent-based model for a peer-to-peer system. This work was designed to accommodate peer registration phase that will allow peers on satisfying defined requirement, request for connection to the super peer, subsequently guaranteeing and promoting healthy system. The agent module in the network ascertains successfully connected peers on the network, certifying feedback agent goal and ready for peer communication. The result shows that peculiar security attacks from malicious and un-registered peers are systematically controlled in the peer-to-peer system. Key words : Peer-to-peer, Agent-based, Secured and Communication. DOI: 10.7176/CEIS/12-2-03 Publication date: May30th 202

    Secure Mobile Agent for Telemedicine Based on P2P Networks

    Get PDF

    Breaking and Fixing of an Identity Based Multi-Signcryption Scheme

    Get PDF
    Signcryption is a cryptographic primitive that provides authentication and confidentiality simultaneously in a single logical step. It is often required that multiple senders have to signcrypt a single message to a certain receiver. Obviously, it is inefficient to signcrypt the messages separately. An efficient alternative is to go for multi-signcryption. The concept of multi-signcryption is similar to that of multi-signatures with the added property - confidentiality. Recently, Jianhong et al. proposed an identity based multi-signcryption scheme. They claimed that their scheme is secure against adaptive chosen ciphertext attack and it is existentially unforgeable. In this paper, we show that their scheme is not secure against chosen plaintext attack and is existentially forgeable, we also provide a fix for the scheme and prove formally that the improved scheme is secure against both adaptive chosen ciphertext attack and existential forgery
    corecore