Skip to main content

Hybrid Distributed-Hierarchical Identity Based Cryptographic Scheme for Wireless Sensor Networks

  • Conference paper
New Contributions in Information Systems and Technologies

Abstract

There is a major concern in the field of Wireless Sensor Networks regarding information security in very large infrastructures, where classical security models cannot be applied due to the very strict resource constraints of network nodes. For this, identity based cryptographic schemes, distributed key generators and hierarchical security infrastructures have been intensively discussed but, from our knowledge, no proposals have been made that would also cover two very important issues regarding this type of security systems – secure key issuing and key escrow. We are proposing such a security scheme that would benefit from both hierarchical and distributed approaches, with special attention to key escrow and key issuing. Also, we are envisioning some applications that would benefit from such a security scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 369.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Horwitz, J., Lynn, B.: Toward Hierarchical Identity-Based Encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, p. 466. Springer, Heidelberg (2002)

    Google Scholar 

  2. Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, p. 213. Springer, Heidelberg (2001)

    Google Scholar 

  3. Gentry, C., Silverberg, A.: Hierarchical ID-Based Cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548–566. Springer, Heidelberg (2002)

    Google Scholar 

  4. Dodis, Y., Yung, M.: Exposure-resilience for free: The case of hierarchical ID-based encryption. In: IEEE International Security in Storage Workshop (2002)

    Google Scholar 

  5. Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical Identity Based Encryption with Constant Size Ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440–456. Springer, Heidelberg (2005)

    Google Scholar 

  6. Au, M., Liu, J., Yuen, T., Wong, D.: Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles. In: IACR Eprint archive (2006)

    Google Scholar 

  7. Zhang, L., Wu, Q., Hu, Y.: Hierarchical Identity Based Encryption with Constant-Size Private Keys. ETRI Journal (2012)

    Google Scholar 

  8. Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. Journal of Cryptology (2007)

    Google Scholar 

  9. Kate, A., Goldberg, I.: Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography. Cryptology ePrint Archive (2010)

    Google Scholar 

  10. Kate, A., Goldberg, I.: Distributed private-key generators for identity-based cryptography. In: Proceedings of the 7th International Conference on Security and Cryptography for Networks, SCN 2010 (2010)

    Google Scholar 

  11. Siad, A.: Anonymous Identity-Based Encryption with Distributed Private-Key Generator and Searchable Encryption. In: 5th International Conference on New Technologies, Mobility and Security (2012)

    Google Scholar 

  12. Chan, A.-F.: Distributed private key generation for identity based cryptosystems in ad hoc networks. In: Wireless Communications Letters. IEEE (2012)

    Google Scholar 

  13. Al-Riyami, S.S., Paterson, K.G.: Certificateless Public Key Cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)

    Google Scholar 

  14. Lee, B., Boyd, C., Dawson, E., Kim, K., Yang, J., Yoo, S.: Secure key issuing in ID-based cryptography. In: Proceedings of the Second workshop on Australasian Information security, Data Mining and Web Intelligence, and Software Internationalization (2004)

    Google Scholar 

  15. Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing, Okinawa. SCIC 2000-C20 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Constantin Grumăzescu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Grumăzescu, C., Pura, ML., Patriciu, VV. (2015). Hybrid Distributed-Hierarchical Identity Based Cryptographic Scheme for Wireless Sensor Networks. In: Rocha, A., Correia, A., Costanzo, S., Reis, L. (eds) New Contributions in Information Systems and Technologies. Advances in Intelligent Systems and Computing, vol 353. Springer, Cham. https://doi.org/10.1007/978-3-319-16486-1_94

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-16486-1_94

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-16485-4

  • Online ISBN: 978-3-319-16486-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics