z-logo
open-access-imgOpen Access
On Designing Secured Communication Protocols along with Anonymity for CRT based Structured P2P Network Architecture
Author(s) -
Koushik Maddali,
Swathi Kaluvakuri,
Nick Rahimi,
Bidyut Gupta,
Narayan C. Debnath
Publication year - 2021
Publication title -
epic series in computing
Language(s) - English
Resource type - Conference proceedings
ISSN - 2398-7340
DOI - 10.29007/cfc9
Subject(s) - anonymity , computer science , communication in small groups , architecture , computer network , multicast , communication complexity , group (periodic table) , distributed computing , chinese remainder theorem , computer security , theoretical computer science , art , chemistry , organic chemistry , algorithm , visual arts
In this work, we have considered designing secured communication protocols for Chinese remainder theorem based structured p2p architecture. Such an architecture has been the choice because of the complexity in Inter or Intra group communications are just O(1) [16]. In this work, we have considered efficient way to make the already existing communication protocols [16] secured. We have extended these protocols further to include anonymity. We have considered security separately for multicasting inside a group and multicasting outside the group.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here