Skip to main content
Log in

Identity-based key distribution for mobile Ad Hoc networks

  • Research Article
  • Published:
Frontiers of Computer Science in China Aims and scope Submit manuscript

Abstract

An identity-based cryptosystem can make a special contribution to building key distribution and management architectures in resource-constrained mobile ad hoc networks since it does not suffer from certificate management problems. In this paper, based on a lightweight cryptosystem, elliptic curve cryptography (ECC), we propose an identity-based distributed key-distribution protocol for mobile ad hoc networks. In this protocol, using secret sharing, we build a virtual private key generator which calculates one part of a user’s secret key and sends it to the user via public channels, while, the other part of the secret key is generated by the user. So, the secret key of the user is generated collaboratively by the virtual authority and the user. Each has half of the secret information about the secret key of the user. Thus there is no secret key distribution problem. In addition, the user’s secret key is known only to the user itself, therefore there is no key escrow.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Zhou L, Haas Z J. Securing Ad Hoc networks. IEEE Network, 1999, 13(6): 24–30

    Article  Google Scholar 

  2. Kong J, Zerfos P, Luo H, Lu S, Zhang L. Providing robust and ubiquitous security support for mobile Ad Hoc networks. In: Proceedings of 9th International Conference on Network Protocols. 2001, 251–260

  3. Khalili A, Katz J, Arbaugh W. Toward secure key distribution in truly Ad-Hoc networks. In: Proceedings of 2003 SAINT Workshops. 2003, 342–346

  4. Hegland A M, Winjum E, Mjolsnes S F, Rong C, Kure Ø, Spilling P. A survey of key management in Ad Hoc networks. IEEE Communications Surveys & Tutorials, 2006, 8(3): 48–66

    Article  Google Scholar 

  5. Shamir A. Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO. 1984, 84: 47–53

    Google Scholar 

  6. Boneh D, Franklin M. Identity based encryption from the Weil pairing. SIAM Journal on Computing, 2003, 32(3): 586–615

    Article  MATH  MathSciNet  Google Scholar 

  7. Girault M. Self-certified public keys. In: Proceedings of 1991 Workshop on the Theory and Application of Cryptographic Techniques. 1991, 490–497

  8. Stenberg E M. Distributing a private key generator in Ad Hoc Networks. Dissertation for the Master Degree. Tromsø: University of Tromsø, 2009

    Google Scholar 

  9. Deng H, Mukherjee A, Agrawal D. Threshold and identity-based key management and authentication for wireless Ad Hoc networks. In: Proceedings of 2004 International Conference on Information Technology: Coding and Computing. 2004, 107–111

  10. Johnson D, Menezes A, Vanstone S. The elliptic curve digital signature algorithm (ECDSA). International Journal of Information Security, 2001, 1(1): 36–63

    Google Scholar 

  11. Nogami Y, Akane M, Sakemi Y, Kato H, Morikawa Y. Integer variable χ-based ate pairing. In: Proceedings of 2nd International Conference on Pairing-based Cryptography. 2008, 178–191

  12. Boneh D, Lynn B, Shacham H. Short signatures from the Weil pairing. In: Proceedings of 7th International Conference on the Theory and Application of Cryptology and Information Security. 2001, 514–532

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xixiang Lv.

Additional information

Dr. Xixiang Lv studied in Xidian University from 1997 to 2007 and received her respective MSc and PhD in cryptography in 2004 and 2007. She is now an associate professor of Xidian University. Her research interests lie in information security and wireless network security.

Dr. Hui Li received his BE from Fudan University in 1990, and his PhD in Communication and Electronic Engineering from Xidian University in 1998. He has published around 30 academic papers in the areas of information security and coding theory. His research interests include information security, coding theory and wireless network security.

Dr. Baocang Wang received his BSc in Computational Mathematics and their Application Software in 2001, his MSc in 2004 and PhD 2006, both in Cryptology, all from Xidian University. Currently, he is an associate professor in the Department of Telecommunication Engineering, Xidian University. His research interests lie in cryptography and network security.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lv, X., Li, H. & Wang, B. Identity-based key distribution for mobile Ad Hoc networks. Front. Comput. Sci. China 5, 442–447 (2011). https://doi.org/10.1007/s11704-011-0197-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11704-011-0197-5

Keywords

Navigation