DocumentCode :
2309803
Title :
Modelling Threshold Secret Sharing Schemes in Ad Hoc Networks
Author :
Chen, Weifeng ; Li, Huan
Author_Institution :
Dept. of Math & Comput. Sci., California Univ. of Pennsylvania, California, PA
fYear :
2008
fDate :
12-14 June 2008
Firstpage :
207
Lastpage :
214
Abstract :
A threshold secret sharing scheme divides a secret key into multiple shares. The secret key can be constructed based on a certain number of shares, if the number is bigger than the threshold. Threshold secret sharing schemes increase the availability of service in ad hoc networks and avoid the single point of failure. Consequently, many security mechanisms have been proposed based on threshold secret sharing. However, research about how to choose an appropriate threshold is still missing. In this paper, we use fork/join queueing theories to develop a general model to evaluate the performance of a threshold secret sharing scheme in ad hoc networks. Specifically, we focus on the response time a requesting node needs to wait before it receives enough responded shares. Our proposed model allows one to numerically calculate the response time based on the threshold. It also provides a tool for people to choose an appropriate threshold when deploying a threshold secret sharing scheme in ad hoc networks.
Keywords :
ad hoc networks; queueing theory; telecommunication services; ad hoc networks; fork/join queueing theories; threshold secret sharing schemes; Ad hoc networks; Availability; Certification; Computer architecture; Computer science; Cryptography; Delay; Mission critical systems; Network servers; Queueing analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Networking, Architecture, and Storage, 2008. NAS '08. International Conference on
Conference_Location :
Chongqing
Print_ISBN :
978-0-7695-3187-8
Type :
conf
DOI :
10.1109/NAS.2008.60
Filename :
4579595
Link To Document :
بازگشت