Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front Comput Sci Chin    2011, Vol. 5 Issue (4) : 442-447    https://doi.org/10.1007/s11704-011-0197-5
RESEARCH ARTICLE
Identity-based key distribution for mobile Ad Hoc networks
Xixiang LV1(), Hui LI1, Baocang WANG1,2
1. State Key Laboratory of Integrated Service Networks, Xidian University, Xi’an 710071, China; 2. State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100049, China
 Download: PDF(140 KB)   HTML
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

An identity-based cryptosystem can make a special contribution to building key distribution and management architectures in resource-constrained mobile ad hoc networks since it does not suffer from certificate management problems. In this paper, based on a lightweight cryptosystem, elliptic curve cryptography (ECC), we propose an identity-based distributed key-distribution protocol for mobile ad hoc networks. In this protocol, using secret sharing, we build a virtual private key generator which calculates one part of a user’s secret key and sends it to the user via public channels, while, the other part of the secret key is generated by the user. So, the secret key of the user is generated collaboratively by the virtual authority and the user. Each has half of the secret information about the secret key of the user. Thus there is no secret key distribution problem. In addition, the user’s secret key is known only to the user itself, therefore there is no key escrow.

Keywords key distribution      Ad Hoc networks      identity-based cryptography     
Corresponding Author(s): LV Xixiang,Email:xxlv@mail.xidian.edu.cn   
Issue Date: 05 December 2011
 Cite this article:   
Xixiang LV,Hui LI,Baocang WANG. Identity-based key distribution for mobile Ad Hoc networks[J]. Front Comput Sci Chin, 2011, 5(4): 442-447.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-011-0197-5
https://academic.hep.com.cn/fcs/EN/Y2011/V5/I4/442
Fig.1  Network model and scenario
Fig.2  Key distribution phase
1 Zhou L, Haas Z J. Securing Ad Hoc networks. IEEE Network , 1999, 13(6): 24–30
2 Kong J, Zerfos P, Luo H, Lu S, Zhang L. Providing robust and ubiquitous security support for mobile Ad Hoc networks. In: Proceedings of 9th International Conference on Network Protocols . 2001, 251–260
3 Khalili A, Katz J, Arbaugh W. Toward secure key distribution in truly Ad-Hoc networks. In: Proceedings of 2003 SAINT Workshops . 2003, 342–346
4 Hegland A M, Winjum E, Mjolsnes S F, Rong C, Kure ?, Spilling P. A survey of key management in Ad Hoc networks. IEEE Communications Surveys & Tutorials , 2006, 8(3): 48–66
5 Shamir A. Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO . 1984, 84: 47–53
6 Boneh D, Franklin M. Identity based encryption from the Weil pairing. SIAM Journal on Computing , 2003, 32(3): 586–615
7 Girault M. Self-certified public keys. In: Proceedings of 1991 Workshop on the Theory and Application of Cryptographic Techniques . 1991, 490–497
8 Stenberg E M. Distributing a private key generator in Ad Hoc Networks. Dissertation for the Master Degree. Troms?: University of Troms? , 2009
9 Deng H, Mukherjee A, Agrawal D. Threshold and identity-based key management and authentication for wireless Ad Hoc networks. In: Proceedings of 2004 International Conference on Information Technology: Coding and Computing . 2004, 107–111
10 Johnson D, Menezes A, Vanstone S. The elliptic curve digital signature algorithm (ECDSA). International Journal of Information Security , 2001, 1(1): 36–63
11 Nogami Y, Akane M, Sakemi Y, Kato H, Morikawa Y. Integer variable χ-based ate pairing. In: Proceedings of 2nd International Conference on Pairing-based Cryptography . 2008, 178–191
12 Boneh D, Lynn B, Shacham H. Short signatures from the Weil pairing. In: Proceedings of 7th International Conference on the Theory and Application of Cryptology and Information Security . 2001, 514–532
[1] Libing WU, Lei NIE, Samee U. KHAN, Osman KHALID, Dan WU. A V2I communication-based pipeline model for adaptive urban traffic light scheduling[J]. Front. Comput. Sci., 2019, 13(5): 929-942.
[2] Wei GAO, Guilin WANG, Kefei CHEN, Xueli WANG. Efficient identity-based threshold decryption scheme from bilinear pairings[J]. Front. Comput. Sci., 2018, 12(1): 177-189.
[3] Gang LI, Hongmei SUN, . Virtual node based adaptive routing in wireless ad hoc networks[J]. Front. Comput. Sci., 2009, 3(4): 535-542.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed