Identity-based key distribution for mobile Ad Hoc networks
Xixiang LV, Hui LI, Baocang WANG
Identity-based key distribution for mobile Ad Hoc networks
An identity-based cryptosystem can make a special contribution to building key distribution and management architectures in resource-constrained mobile ad hoc networks since it does not suffer from certificate management problems. In this paper, based on a lightweight cryptosystem, elliptic curve cryptography (ECC), we propose an identity-based distributed key-distribution protocol for mobile ad hoc networks. In this protocol, using secret sharing, we build a virtual private key generator which calculates one part of a user’s secret key and sends it to the user via public channels, while, the other part of the secret key is generated by the user. So, the secret key of the user is generated collaboratively by the virtual authority and the user. Each has half of the secret information about the secret key of the user. Thus there is no secret key distribution problem. In addition, the user’s secret key is known only to the user itself, therefore there is no key escrow.
key distribution / Ad Hoc networks / identity-based cryptography
[1] |
Zhou L, Haas Z J. Securing Ad Hoc networks. IEEE Network, 1999, 13(6): 24–30
|
[2] |
Kong J, Zerfos P, Luo H, Lu S, Zhang L. Providing robust and ubiquitous security support for mobile Ad Hoc networks. In: Proceedings of 9th International Conference on Network Protocols. 2001, 251–260
|
[3] |
Khalili A, Katz J, Arbaugh W. Toward secure key distribution in truly Ad-Hoc networks. In: Proceedings of 2003 SAINT Workshops. 2003, 342–346
|
[4] |
Hegland A M, Winjum E, Mjolsnes S F, Rong C, Kure Ø, Spilling P. A survey of key management in Ad Hoc networks. IEEE Communications Surveys & Tutorials, 2006, 8(3): 48–66
|
[5] |
Shamir A. Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO. 1984, 84: 47–53
|
[6] |
Boneh D, Franklin M. Identity based encryption from the Weil pairing. SIAM Journal on Computing, 2003, 32(3): 586–615
|
[7] |
Girault M. Self-certified public keys. In: Proceedings of 1991 Workshop on the Theory and Application of Cryptographic Techniques. 1991, 490–497
|
[8] |
Stenberg E M. Distributing a private key generator in Ad Hoc Networks. Dissertation for the Master Degree. Tromsø: University of Tromsø, 2009
|
[9] |
Deng H, Mukherjee A, Agrawal D. Threshold and identity-based key management and authentication for wireless Ad Hoc networks. In: Proceedings of 2004 International Conference on Information Technology: Coding and Computing. 2004, 107–111
|
[10] |
Johnson D, Menezes A, Vanstone S. The elliptic curve digital signature algorithm (ECDSA). International Journal of Information Security, 2001, 1(1): 36–63
|
[11] |
Nogami Y, Akane M, Sakemi Y, Kato H, Morikawa Y. Integer variable χ-based ate pairing. In: Proceedings of 2nd International Conference on Pairing-based Cryptography. 2008, 178–191
|
[12] |
Boneh D, Lynn B, Shacham H. Short signatures from the Weil pairing. In: Proceedings of 7th International Conference on the Theory and Application of Cryptology and Information Security. 2001, 514–532
|
/
〈 | 〉 |