@article {10.3844/jcssp.2023.1.10, article_type = {journal}, title = {Anonymous and Distributed Authentication for Peer-to-Peer Networks}, author = {Tennakoon, Pasan and Karunathilaka, Supipi and Lavakumar, Rishikeshan and Alawatugoda, Janaka}, volume = {19}, number = {1}, year = {2023}, month = {Jan}, pages = {1-10}, doi = {10.3844/jcssp.2023.1.10}, url = {https://thescipub.com/abstract/jcssp.2023.1.10}, abstract = {Well-known authentication mechanisms such as Public-key Infrastructure (PKI) and Identity-based Public-key Certificates (ID-PKC) are not suitable for integration in a Peer-to-Peer (P2P) network environment, the reason being either the lack of or the difficulty in maintaining a centralized authority to manage the certificates. Authentication becomes even harder in anonymous environments. In this study, we present three authentication protocols such that the users can authenticate themselves in an anonymous P2P network, without revealing their identities. The first protocol uses existing ring signature schemes to obtain anonymous authentication, the second is an anonymous authentication protocol utilizing secret sharing schemes, and lastly a zero-knowledge-based anonymous authentication protocol. We provide security justifications for the three aforementioned protocols in terms of anonymity, completeness, soundness, resilience to impersonation attacks, and resilience to replay attacks. We also provide examples of conceptual topologies and how the peers would behave and rearrange in case of failure.}, journal = {Journal of Computer Science}, publisher = {Science Publications} }