Use of service providers' user authentication infrastructure to implement public key infrastructure for peer-to-peer networks |
|
Peer entity authentication is a mandatory requirement for securing peer-to-peer communications. However, especially in pure peer-to-peer (P2P) networks, it is difficult for peers to authenticate corresponding peer entities because there is no central server for authentication they can rely on. In addition, the existing public key infrastructure (PKI) has little use for this purpose because those peer entities rarely have public key certificates issued by well-known certification authorities.
The purpose of Recommendation ITU-T X.1164 is to define mechanisms to utilize service providers' user authentication infrastructure to implement PKI for P2P networks, with which users who have a valid e-mail account managed by a service provider can issue certificates to their devices by themselves and make those certificates verifiable by corresponding peers in P2P networks.
|
|
Citation: |
https://handle.itu.int/11.1002/1000/11749 |
Series title: |
X series: Data networks, open system communications and security X.1100-X.1199: Secure applications and services (I) X.1160-X.1164: Peer-to-peer security |
Approval date: |
2012-10-14 |
Provisional name: | X.p2p-4 |
Approval process: | AAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1164 (10/2012)
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
Current and new challenges for public-key infrastructure standardization
|
2014
|
here
|
|