DocumentCode
3265870
Title
A Distributed ECC-DSS Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET
Author
Lu, Qiwei ; Xiong, Yan ; Huang, Wenchao ; Gong, Xudong ; Miao, Fuyou
Author_Institution
Dept. of Comput. Sci. & Technol., Univ. of Sci. & Technol. of China, Hefei, China
fYear
2012
fDate
25-27 June 2012
Firstpage
656
Lastpage
665
Abstract
With the rapid development of MANET, the secure and practical authentication problem in it increasingly becomes outstanding. The existing work study the problem from two aspects, i.e. secure key division/distributed storage and secure distributed authentication. But existing cheating problems and fault attack possibility will break the security. Besides, efficiency performance of such schemes is not good enough due to the exponential arithmetic with Shamir´s scheme. Due to these problems above, we explore the property of verifiable secret sharing(VSS) schemes with Chinese Remainder Theorem(CRT). Then a secret key distributed storage scheme based on CRT-VSS and trusted computing is proposed for MANET. We utilize trusted computing technology to solve two existing cheating problems in secret sharing area before. After that we do some analysis of the homomorphism property with CRT-VSS scheme. Compared with the secure shares-product sharing scheme based on Shamir´s scheme, we design the corresponding scheme base on CRT-VSS scheme with better concision and equal security later. On such basis, a distributed Elliptic Curve-Digital Signature Standard signature (ECC-DSS) authentication scheme based on CRT-VSS scheme and trusted computing is proposed. The choice of the trusted authentication node can eliminates the possibility of traditional DoS and fault attack. At last, we do some security analysis towards our schemes proposed above.
Keywords
distributed processing; mobile ad hoc networks; telecommunication security; trusted computing; CRT-VSS; Chinese remainder theorem; MANET; Shamir scheme; distributed ECC-DSS authentication scheme; distributed storage; exponential arithmetic; secure distributed authentication; secure key division; trusted computing; verifiable secret sharing; Authentication; Computers; Cryptography; Mobile ad hoc networks; Privacy; Protocols; CSP security model; Chinese Remainder Theorem; distributed authentication; secret sharing; trusted computing;
fLanguage
English
Publisher
ieee
Conference_Titel
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
Conference_Location
Liverpool
Print_ISBN
978-1-4673-2172-3
Type
conf
DOI
10.1109/TrustCom.2012.24
Filename
6296033
Link To Document