Title :
A verifiable dynamic threshold key management scheme based on bilinear pairing without a trusted party in mobile ad hoc network
Author :
Meng, Xianyong ; Li, Yangmin
Author_Institution :
Dept. of Electromech. Eng., Univ. of Macau, Macao, China
Abstract :
A dynamic threshold key management scheme based on bilinear pairing without a trusted party is proposed in this paper. The system can dynamically add, modify and remove a member in MANET, and can change the threshold value according to the scale of the group. Adopting distributed framework generates the system key, which is constructed by all participants collectively, it is not like most presented schemes generated by Key Generation Center (KGC). In our threshold scheme, any participant can recover the system public key, but can not reconstruct the system secret key without any other t - 1 participants´ help. The designated combiner (DC) can verify the correctness of shared secret during the recovery phase of system key. Simultaneously, the threshold polynomial based on elliptic curve cryptography (ECC) is obviously more secure and efficient than the previous schemes´ polynomial based on prime-field. Additionally, we design a new feasible bilinear pairing based signcryption scheme, which is efficient in terms of both computational complexity and communication load and can realize security communication between any two participants. The security analysis shows that the proposed scheme is more feasible, secure and efficient compared with the previous schemes on Mobile Ad Hoc Network.
Keywords :
communication complexity; mobile ad hoc networks; polynomials; public key cryptography; telecommunication security; ECC; KGC; MANET; bilinear pairing based signcryption scheme; communication load; computational complexity; designated combiner; distributed framework; elliptic curve cryptography; key generation center; mobile ad hoc network; prime-field; security analysis; security communication; shared secret; system key recovery phase; system public key; system secret key; threshold polynomial; threshold scheme; threshold value; trusted party; verifiable dynamic threshold key management scheme; Elliptic curve cryptography; Elliptic curves; Mobile ad hoc networks; Polynomials; Bilinear Pairing; Mobile Ad Hoc Network; Signcryption; Threshold Key Management; Without a Trusted Party;
Conference_Titel :
Automation and Logistics (ICAL), 2012 IEEE International Conference on
Conference_Location :
Zhengzhou
Print_ISBN :
978-1-4673-0362-0
Electronic_ISBN :
2161-8151
DOI :
10.1109/ICAL.2012.6308218