DocumentCode :
2106901
Title :
A secure distributed key management scheme for ad hoc network
Author :
Xu, Yan ; Zhong, Hong ; Yuan, Xianping ; Yu, Jia
Author_Institution :
Key Lab. of Intell. Comput. & Signal, Anhui Univ., Hefei, China
fYear :
2010
fDate :
17-19 Dec. 2010
Firstpage :
371
Lastpage :
374
Abstract :
An identity-based threshold key management scheme without secure channel is proposed for ad hoc network. The master private key, which is shared among all nodes by the Shamir´s secret sharing scheme, is produced by all nodes when network is formed. The nodes´ public keys are derived from their identities. In order to get the private key, each node needs to prove their identity to distributed CAs using a zero-knowledge proof protocol to get the share of private key. Compared with former schemes, our scheme doesn´t need any local registration authority (LRA), which is easy to be compromised by adversary. When a node leaves the network, shares of the master private key would be renewed. In the end, we prove our scheme is correct and secure.
Keywords :
ad hoc networks; cryptographic protocols; private key cryptography; public key cryptography; Shamir secret sharing; ad hoc network; local registration authority; master private key; node public keys; secure distributed key management; zero-knowledge proof protocol; Ad hoc networks; Polynomials; Protocols; Public key; Wireless communication; ad hoc network; id-based cryptography; key management; threshold scheme;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Theory and Information Security (ICITIS), 2010 IEEE International Conference on
Conference_Location :
Beijing
Print_ISBN :
978-1-4244-6942-0
Type :
conf
DOI :
10.1109/ICITIS.2010.5689594
Filename :
5689594
Link To Document :
بازگشت