Author_Institution :
State Key Lab. of Inf. Security, Grad. Univ. of Chinese Acad. of Sci., Beijing, China
Abstract :
Fully distributed threshold key management in MANET encounters some open problems now. One of them is the availability of secure threshold key distribution protocol. In this paper, we study fully identity-based and threshold key distribution methods in MANET. For improve the availability of these methods, we propose an identity-based multi-signcryption scheme, which can efficient achieve message confidentiality, unforgeability, non-repudiation, robustness in multi-users; moreover, it has message flexibility, order flexibility, message verifiability, and order verifiability. For that, we use this multi-signcryption scheme to identity-based and threshold key distribution protocols; as a result, a new identity-based and threshold key distribution protocol for MANET is given. Owing to the advantages of our identity-based multi-signcryption scheme, our key distribution protocol not only can distributed threshold key in secure and efficient manner, but improves the availability of fully distributed threshold key management in MANET.
Keywords :
ad hoc networks; cryptographic protocols; mobile radio; telecommunication network management; telecommunication security; ID-based distribution protocol; MANET; distributed threshold key management; identity-based multi-signcryption scheme; message confidentiality; message flexibility; message verifiability; order flexibility; order verifiability; robustness; secure threshold key distribution protocol; Availability; Computational intelligence; Engineering management; Identity management systems; Identity-based encryption; Information security; Laboratories; Mobile ad hoc networks; Protocols; Robustness; ID-based multi-signcryption; MANET; Threshold key management; key distribution protocol;