Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
An Identity-Based Signature from Gap Diffie-Hellman Groups
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Toward Secure Key Distribution in Truly Ad-Hoc Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
IEEE Network: The Magazine of Global Internetworking
Security and Communication Networks
Hi-index | 0.00 |
With initial trust in the system model, a new identity-based distributed key management scheme is proposed. Verifiable secret sharing technology and blind short signatures are applied into this scheme. The scheme is composed of system initialization, update of a node's private key, share refreshing of system private key, discover of malicious node and key revocation. The model with initial trust makes the scheme more secure. The overhead of storage, communication and computation are reduced since the identity-based public key system is used. The verifiable secret share technology effectively prevents the node from behaving dishonestly. The update scheme of a node's private key provides mutual authentication. The blind short signature ensures the share of private key can be transmitted in the unsecured channel. The key revocation is simple and convenient since the valid time is added to the key. The analysis shows that the proposed scheme not only provides greater security, but also improves the efficiency than previous scheme for ad hoc networks.