Abstract
An identity-based cryptosystem can make a special contribution to building key distribution and management architectures in resource-constrained mobile ad hoc networks since it does not suffer from certificate management problems. In this paper, based on a lightweight cryptosystem, elliptic curve cryptography (ECC), we propose an identity-based distributed key-distribution protocol for mobile ad hoc networks. In this protocol, using secret sharing, we build a virtual private key generator which calculates one part of a user’s secret key and sends it to the user via public channels, while, the other part of the secret key is generated by the user. So, the secret key of the user is generated collaboratively by the virtual authority and the user. Each has half of the secret information about the secret key of the user. Thus there is no secret key distribution problem. In addition, the user’s secret key is known only to the user itself, therefore there is no key escrow.
Similar content being viewed by others
References
Zhou L, Haas Z J. Securing Ad Hoc networks. IEEE Network, 1999, 13(6): 24–30
Kong J, Zerfos P, Luo H, Lu S, Zhang L. Providing robust and ubiquitous security support for mobile Ad Hoc networks. In: Proceedings of 9th International Conference on Network Protocols. 2001, 251–260
Khalili A, Katz J, Arbaugh W. Toward secure key distribution in truly Ad-Hoc networks. In: Proceedings of 2003 SAINT Workshops. 2003, 342–346
Hegland A M, Winjum E, Mjolsnes S F, Rong C, Kure Ø, Spilling P. A survey of key management in Ad Hoc networks. IEEE Communications Surveys & Tutorials, 2006, 8(3): 48–66
Shamir A. Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO. 1984, 84: 47–53
Boneh D, Franklin M. Identity based encryption from the Weil pairing. SIAM Journal on Computing, 2003, 32(3): 586–615
Girault M. Self-certified public keys. In: Proceedings of 1991 Workshop on the Theory and Application of Cryptographic Techniques. 1991, 490–497
Stenberg E M. Distributing a private key generator in Ad Hoc Networks. Dissertation for the Master Degree. Tromsø: University of Tromsø, 2009
Deng H, Mukherjee A, Agrawal D. Threshold and identity-based key management and authentication for wireless Ad Hoc networks. In: Proceedings of 2004 International Conference on Information Technology: Coding and Computing. 2004, 107–111
Johnson D, Menezes A, Vanstone S. The elliptic curve digital signature algorithm (ECDSA). International Journal of Information Security, 2001, 1(1): 36–63
Nogami Y, Akane M, Sakemi Y, Kato H, Morikawa Y. Integer variable χ-based ate pairing. In: Proceedings of 2nd International Conference on Pairing-based Cryptography. 2008, 178–191
Boneh D, Lynn B, Shacham H. Short signatures from the Weil pairing. In: Proceedings of 7th International Conference on the Theory and Application of Cryptology and Information Security. 2001, 514–532
Author information
Authors and Affiliations
Corresponding author
Additional information
Dr. Xixiang Lv studied in Xidian University from 1997 to 2007 and received her respective MSc and PhD in cryptography in 2004 and 2007. She is now an associate professor of Xidian University. Her research interests lie in information security and wireless network security.
Dr. Hui Li received his BE from Fudan University in 1990, and his PhD in Communication and Electronic Engineering from Xidian University in 1998. He has published around 30 academic papers in the areas of information security and coding theory. His research interests include information security, coding theory and wireless network security.
Dr. Baocang Wang received his BSc in Computational Mathematics and their Application Software in 2001, his MSc in 2004 and PhD 2006, both in Cryptology, all from Xidian University. Currently, he is an associate professor in the Department of Telecommunication Engineering, Xidian University. His research interests lie in cryptography and network security.
Rights and permissions
About this article
Cite this article
Lv, X., Li, H. & Wang, B. Identity-based key distribution for mobile Ad Hoc networks. Front. Comput. Sci. China 5, 442–447 (2011). https://doi.org/10.1007/s11704-011-0197-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11704-011-0197-5