Identity-based key distribution for mobile Ad Hoc networks

Xixiang LV, Hui LI, Baocang WANG

PDF(140 KB)
PDF(140 KB)
Front. Comput. Sci. ›› 2011, Vol. 5 ›› Issue (4) : 442-447. DOI: 10.1007/s11704-011-0197-5
RESEARCH ARTICLE

Identity-based key distribution for mobile Ad Hoc networks

Author information +
History +

Abstract

An identity-based cryptosystem can make a special contribution to building key distribution and management architectures in resource-constrained mobile ad hoc networks since it does not suffer from certificate management problems. In this paper, based on a lightweight cryptosystem, elliptic curve cryptography (ECC), we propose an identity-based distributed key-distribution protocol for mobile ad hoc networks. In this protocol, using secret sharing, we build a virtual private key generator which calculates one part of a user’s secret key and sends it to the user via public channels, while, the other part of the secret key is generated by the user. So, the secret key of the user is generated collaboratively by the virtual authority and the user. Each has half of the secret information about the secret key of the user. Thus there is no secret key distribution problem. In addition, the user’s secret key is known only to the user itself, therefore there is no key escrow.

Keywords

key distribution / Ad Hoc networks / identity-based cryptography

Cite this article

Download citation ▾
Xixiang LV, Hui LI, Baocang WANG. Identity-based key distribution for mobile Ad Hoc networks. Front Comput Sci Chin, 2011, 5(4): 442‒447 https://doi.org/10.1007/s11704-011-0197-5

References

[1]
Zhou L, Haas Z J. Securing Ad Hoc networks. IEEE Network, 1999, 13(6): 24–30
[2]
Kong J, Zerfos P, Luo H, Lu S, Zhang L. Providing robust and ubiquitous security support for mobile Ad Hoc networks. In: Proceedings of 9th International Conference on Network Protocols. 2001, 251–260
[3]
Khalili A, Katz J, Arbaugh W. Toward secure key distribution in truly Ad-Hoc networks. In: Proceedings of 2003 SAINT Workshops. 2003, 342–346
[4]
Hegland A M, Winjum E, Mjolsnes S F, Rong C, Kure Ø, Spilling P. A survey of key management in Ad Hoc networks. IEEE Communications Surveys & Tutorials, 2006, 8(3): 48–66
[5]
Shamir A. Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO. 1984, 84: 47–53
[6]
Boneh D, Franklin M. Identity based encryption from the Weil pairing. SIAM Journal on Computing, 2003, 32(3): 586–615
[7]
Girault M. Self-certified public keys. In: Proceedings of 1991 Workshop on the Theory and Application of Cryptographic Techniques. 1991, 490–497
[8]
Stenberg E M. Distributing a private key generator in Ad Hoc Networks. Dissertation for the Master Degree. Tromsø: University of Tromsø, 2009
[9]
Deng H, Mukherjee A, Agrawal D. Threshold and identity-based key management and authentication for wireless Ad Hoc networks. In: Proceedings of 2004 International Conference on Information Technology: Coding and Computing. 2004, 107–111
[10]
Johnson D, Menezes A, Vanstone S. The elliptic curve digital signature algorithm (ECDSA). International Journal of Information Security, 2001, 1(1): 36–63
[11]
Nogami Y, Akane M, Sakemi Y, Kato H, Morikawa Y. Integer variable χ-based ate pairing. In: Proceedings of 2nd International Conference on Pairing-based Cryptography. 2008, 178–191
[12]
Boneh D, Lynn B, Shacham H. Short signatures from the Weil pairing. In: Proceedings of 7th International Conference on the Theory and Application of Cryptology and Information Security. 2001, 514–532

Acknowledgments

This work was sponsored by the National Natural Science Foundation of China (Grant No. 60772136), the National Science and Technology Pillar Program (2008BAH22B03, 2007BAH08B01), the 111 Project (B08038), and the Fundamental Research Funds for the Central Universities (JY10000901032).

RIGHTS & PERMISSIONS

2014 Higher Education Press and Springer-Verlag Berlin Heidelberg
AI Summary AI Mindmap
PDF(140 KB)

Accesses

Citations

Detail

Sections
Recommended

/