DocumentCode :
3265870
Title :
A Distributed ECC-DSS Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET
Author :
Lu, Qiwei ; Xiong, Yan ; Huang, Wenchao ; Gong, Xudong ; Miao, Fuyou
Author_Institution :
Dept. of Comput. Sci. & Technol., Univ. of Sci. & Technol. of China, Hefei, China
fYear :
2012
fDate :
25-27 June 2012
Firstpage :
656
Lastpage :
665
Abstract :
With the rapid development of MANET, the secure and practical authentication problem in it increasingly becomes outstanding. The existing work study the problem from two aspects, i.e. secure key division/distributed storage and secure distributed authentication. But existing cheating problems and fault attack possibility will break the security. Besides, efficiency performance of such schemes is not good enough due to the exponential arithmetic with Shamir´s scheme. Due to these problems above, we explore the property of verifiable secret sharing(VSS) schemes with Chinese Remainder Theorem(CRT). Then a secret key distributed storage scheme based on CRT-VSS and trusted computing is proposed for MANET. We utilize trusted computing technology to solve two existing cheating problems in secret sharing area before. After that we do some analysis of the homomorphism property with CRT-VSS scheme. Compared with the secure shares-product sharing scheme based on Shamir´s scheme, we design the corresponding scheme base on CRT-VSS scheme with better concision and equal security later. On such basis, a distributed Elliptic Curve-Digital Signature Standard signature (ECC-DSS) authentication scheme based on CRT-VSS scheme and trusted computing is proposed. The choice of the trusted authentication node can eliminates the possibility of traditional DoS and fault attack. At last, we do some security analysis towards our schemes proposed above.
Keywords :
distributed processing; mobile ad hoc networks; telecommunication security; trusted computing; CRT-VSS; Chinese remainder theorem; MANET; Shamir scheme; distributed ECC-DSS authentication scheme; distributed storage; exponential arithmetic; secure distributed authentication; secure key division; trusted computing; verifiable secret sharing; Authentication; Computers; Cryptography; Mobile ad hoc networks; Privacy; Protocols; CSP security model; Chinese Remainder Theorem; distributed authentication; secret sharing; trusted computing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
Conference_Location :
Liverpool
Print_ISBN :
978-1-4673-2172-3
Type :
conf
DOI :
10.1109/TrustCom.2012.24
Filename :
6296033
Link To Document :
بازگشت