Title :
Threshold key management protocol in mobile ad hoc networks using an ID-based signcryption scheme
Author :
Chuanrong, Zhang ; Hong, Xiao
Author_Institution :
Telecommun. Eng. Inst., Air Force Eng. Univ., Xi´´an, China
Abstract :
Threshold key management as a notable key management in a mobile ad hoc network is facing considerable technical challenges now. For design secure and efficient key management protocol in a mobile ad hoc network, in this paper, we give a new ID-based signcryption scheme which is efficient in terms of both the communication overhead and the computational requirement. Furthermore, we apply our ID-based signcryption scheme into threshold key management. As a result, a system private key share refreshing protocol in threshold key management of a mobile ad hoc network is proposed. This protocol improves the security and efficiency of the previous protocols in a mobile ad hoc network owing to our ID-based signcryption scheme.
Keywords :
ad hoc networks; cryptographic protocols; mobile radio; telecommunication network management; telecommunication security; ID-based signcryption scheme; communication overhead; mobile ad hoc networks; private key share refreshing protocol; threshold key management protocol; Computer network management; Computer networks; Cryptographic protocols; Cryptography; Electronic mail; Engineering management; Identity-based encryption; Mobile ad hoc networks; Mobile communication; Telecommunication network management; ID-based signcryption; Threshold key management; a mobile ad hoc network; bilinear pairing; share refreshing protocol;
Conference_Titel :
Cyber-Enabled Distributed Computing and Knowledge Discovery, 2009. CyberC '09. International Conference on
Conference_Location :
Zhangijajie
Print_ISBN :
978-1-4244-5218-7
Electronic_ISBN :
978-1-4244-5219-4
DOI :
10.1109/CYBERC.2009.5342189