Abstract
There is a major concern in the field of Wireless Sensor Networks regarding information security in very large infrastructures, where classical security models cannot be applied due to the very strict resource constraints of network nodes. For this, identity based cryptographic schemes, distributed key generators and hierarchical security infrastructures have been intensively discussed but, from our knowledge, no proposals have been made that would also cover two very important issues regarding this type of security systems – secure key issuing and key escrow. We are proposing such a security scheme that would benefit from both hierarchical and distributed approaches, with special attention to key escrow and key issuing. Also, we are envisioning some applications that would benefit from such a security scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Horwitz, J., Lynn, B.: Toward Hierarchical Identity-Based Encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, p. 466. Springer, Heidelberg (2002)
Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, p. 213. Springer, Heidelberg (2001)
Gentry, C., Silverberg, A.: Hierarchical ID-Based Cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548–566. Springer, Heidelberg (2002)
Dodis, Y., Yung, M.: Exposure-resilience for free: The case of hierarchical ID-based encryption. In: IEEE International Security in Storage Workshop (2002)
Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical Identity Based Encryption with Constant Size Ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440–456. Springer, Heidelberg (2005)
Au, M., Liu, J., Yuen, T., Wong, D.: Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles. In: IACR Eprint archive (2006)
Zhang, L., Wu, Q., Hu, Y.: Hierarchical Identity Based Encryption with Constant-Size Private Keys. ETRI Journal (2012)
Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. Journal of Cryptology (2007)
Kate, A., Goldberg, I.: Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography. Cryptology ePrint Archive (2010)
Kate, A., Goldberg, I.: Distributed private-key generators for identity-based cryptography. In: Proceedings of the 7th International Conference on Security and Cryptography for Networks, SCN 2010 (2010)
Siad, A.: Anonymous Identity-Based Encryption with Distributed Private-Key Generator and Searchable Encryption. In: 5th International Conference on New Technologies, Mobility and Security (2012)
Chan, A.-F.: Distributed private key generation for identity based cryptosystems in ad hoc networks. In: Wireless Communications Letters. IEEE (2012)
Al-Riyami, S.S., Paterson, K.G.: Certificateless Public Key Cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)
Lee, B., Boyd, C., Dawson, E., Kim, K., Yang, J., Yoo, S.: Secure key issuing in ID-based cryptography. In: Proceedings of the Second workshop on Australasian Information security, Data Mining and Web Intelligence, and Software Internationalization (2004)
Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing, Okinawa. SCIC 2000-C20 (2000)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Grumăzescu, C., Pura, ML., Patriciu, VV. (2015). Hybrid Distributed-Hierarchical Identity Based Cryptographic Scheme for Wireless Sensor Networks. In: Rocha, A., Correia, A., Costanzo, S., Reis, L. (eds) New Contributions in Information Systems and Technologies. Advances in Intelligent Systems and Computing, vol 353. Springer, Cham. https://doi.org/10.1007/978-3-319-16486-1_94
Download citation
DOI: https://doi.org/10.1007/978-3-319-16486-1_94
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-16485-4
Online ISBN: 978-3-319-16486-1
eBook Packages: Computer ScienceComputer Science (R0)