• DocumentCode
    2106901
  • Title

    A secure distributed key management scheme for ad hoc network

  • Author

    Xu, Yan ; Zhong, Hong ; Yuan, Xianping ; Yu, Jia

  • Author_Institution
    Key Lab. of Intell. Comput. & Signal, Anhui Univ., Hefei, China
  • fYear
    2010
  • fDate
    17-19 Dec. 2010
  • Firstpage
    371
  • Lastpage
    374
  • Abstract
    An identity-based threshold key management scheme without secure channel is proposed for ad hoc network. The master private key, which is shared among all nodes by the Shamir´s secret sharing scheme, is produced by all nodes when network is formed. The nodes´ public keys are derived from their identities. In order to get the private key, each node needs to prove their identity to distributed CAs using a zero-knowledge proof protocol to get the share of private key. Compared with former schemes, our scheme doesn´t need any local registration authority (LRA), which is easy to be compromised by adversary. When a node leaves the network, shares of the master private key would be renewed. In the end, we prove our scheme is correct and secure.
  • Keywords
    ad hoc networks; cryptographic protocols; private key cryptography; public key cryptography; Shamir secret sharing; ad hoc network; local registration authority; master private key; node public keys; secure distributed key management; zero-knowledge proof protocol; Ad hoc networks; Polynomials; Protocols; Public key; Wireless communication; ad hoc network; id-based cryptography; key management; threshold scheme;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Theory and Information Security (ICITIS), 2010 IEEE International Conference on
  • Conference_Location
    Beijing
  • Print_ISBN
    978-1-4244-6942-0
  • Type

    conf

  • DOI
    10.1109/ICITIS.2010.5689594
  • Filename
    5689594