Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Spread Spectrum in Mobile Communication
Spread Spectrum in Mobile Communication
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
A novel solution for achieving anonymity in wireless ad hoc networks
PE-WASUN '04 Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Anonymous Secure Routing in Mobile Ad-Hoc Networks
LCN '04 Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks
Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series)
Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series)
On Flow Marking Attacks in Wireless Anonymous Communication Networks
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks
AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 02
Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systems
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
An identity-based key infrastructure suitable for messaging and its application to e-mail
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks
International Journal of Security and Networks
Pairing-Based Onion Routing with Improved Forward Secrecy
ACM Transactions on Information and System Security (TISSEC)
Wireless telemedicine and m-health: technologies, applications and research issues
International Journal of Sensor Networks
An overview of anonymous communications in mobile ad hoc networks
Wireless Communications & Mobile Computing
Security and Communication Networks
Hi-index | 0.00 |
Key management for anonymous communication in mobile ad hoc networks is a critical but unsolved problem. Many current anonymous mobile ad hoc routing protocols assume that mobile users share pairwise secrets before they start an anonymous communication session. This assumption is impractical for many ad hoc scenarios where pairwise shared keys are difficult to be set up in advance. Public-key based solution, such as identity-based cryptographic solutions have been proposed for anonymous communications. However, these approaches assume that a centralised Trust Authority (TA) is in charge of the private key generation. Thus, the anonymous communications are not anonymous to the TA. To solve the above mentioned problems, we present pairing-based encryption/decryption, key exchange, blind certificate and revocation solutions for anonymous communications. Our approach provides the following properties compared to traditional approaches: (1) an Anonymous User's (AU's) identity (i.e. a pseudonym) can be used as his/her public key (i.e. the same as traditional identity-based solution); however, each AU can self-derive his/her private key based on a set of publicly known system parameters and his/her chosen pseudonym (this is different from the traditional identity-based solution); (2) a pair of AUs can derive a shared key based on each other's pseudonym without using interactive key exchanging protocols; (3) an AU can self-choose his/her pseudonym that can be blindly signed by a certificate authority and only the pseudonyms with a verifiable certificate are authorised to participate in the anonymous communications (the certificate can be verified by using a set of publicly known system parameters) and (4) the certificate authority is able to revoke AUs' pseudonym. Due to these properties, our approach reduces key management overhead and is suitable for large-scale and ad hoc anonymous services.