Efficient Identity Based Signature Schemes Based on Pairings
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Applications of Multiple Trust Authorities in Pairing Based Cryptosystems
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
Toward Secure Key Distribution in Truly Ad-Hoc Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
Secure key issuing in ID-based cryptography
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Certificate-based encryption and the certificate revocation problem
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
How to solve key escrow and identity revocation in identity-based encryption schemes
ICISS'05 Proceedings of the First international conference on Information Systems Security
An escrow-less identity-based group-key agreement protocol for dynamic peer groups
International Journal of Security and Networks
Wireless telemedicine and m-health: technologies, applications and research issues
International Journal of Sensor Networks
Security and Communication Networks
Hi-index | 0.00 |
Recently, Identity-Based Cryptography (IBC) schemes have been considered as a tool to secure Mobile Ad Hoc Networks (MANETs) due to the efficient key management of the schemes. In this work, we focus on the role of the Key Generation Centre (KGC) as a key escrow, a property that is inherent to all IBC schemes. We explore the special role of key escrow in MANETs and show that this role significantly differs from key escrows in other networks. We introduce two adversary models for dishonest KGCs in MANETs, including a new spy model where a KGC uses so-called spy nodes that record communications in the network and report them to the KGC. We discuss the two faces of key escrow in MANETs, where our analytical results show that in many MANET applications the KGC can be prevented from being a key escrow. On the other hand, the results of this paper illustrate how a KGC can utilise spy nodes to monitor nodes in a MANET, as needed in some applications.