Proceedings ArticleDOI
Threshold and identity-based key management and authentication for wireless ad hoc networks
Hongmei Deng,A. Mukherjee,Dharma P. Agrawal +2 more
- Vol. 1, pp 107-111
TLDR
This paper proposes a distributed key management and authentication approach by deploying the recently developed concepts of identity-based cryptography and threshold secret sharing, which effectively solves the problem of single point of failure in the traditional public key infrastructure (PKI)-supported system.Abstract:
As various applications of wireless ad hoc network have been proposed, security has become one of the big research challenges and is receiving increasing attention. In this paper, we propose a distributed key management and authentication approach by deploying the recently developed concepts of identity-based cryptography and threshold secret sharing. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management service, which effectively solves the problem of single point of failure in the traditional public key infrastructure (PKI)-supported system. The identity-based cryptography mechanism is applied here not only to provide end-to-end authenticity and confidentiality, but also to save network bandwidth and computational power of wireless nodes.read more
Citations
More filters
Journal ArticleDOI
A survey on peer-to-peer key management for mobile ad hoc networks
TL;DR: The article reviews the most popular peer-to-peer key management protocols for mobile ad hoc networks (MANETs) and discusses and provides comments on the strategy of each group separately.
Patent
Portable Data Encryption Device with Configurable Security Functionality and Method for File Encryption
Robert R. Jueneman,Duane J. Linsenbardt,John N. Young,William Reid Carlisle,Burton George Tregub +4 more
TL;DR: A portable encryption device with logon access controlled by an encryption key, with an on board cryptographic processor for reconstituting the encryption key from a plurality of secrets generated by a secret sharing algorithm, optionally shrouded with external secrets using an invertible transform resistant to quantum computing attacks, was presented in this article.
Journal ArticleDOI
Securing Mobile Ad Hoc Networks with Certificateless Public Keys
TL;DR: IKM is a certificateless solution in that public keys of mobile nodes are directly derivable from their known IDs plus some common information, which eliminates the need for certificate-based authenticated public-key distribution indispensable in conventional public- key management schemes.
Patent
Encryption key fragment distribution
TL;DR: An encryption key may be fragmented into n encryption key fragments such that k
Patent
Extensible authentication management
Sorin Iftimie,Bruce P. Bequette +1 more
TL;DR: In this article, a system and method for controlling access to a resource permits an administrator to make changes to access policies at a server level without having to update client code unless and until such updated code is actually needed by a client.
References
More filters
Journal ArticleDOI
How to share a secret
TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Book ChapterDOI
Identity-based cryptosystems and signature schemes
TL;DR: In this article, the authors introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other's signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.
Journal ArticleDOI
Identity-Based Encryption from the Weil Pairing
Dan Boneh,Matthew K. Franklin +1 more
TL;DR: This work proposes a fully functional identity-based encryption (IBE) scheme based on bilinear maps between groups and gives precise definitions for secure IBE schemes and gives several applications for such systems.
Journal ArticleDOI
Securing ad hoc networks
Lidong Zhou,Zygmunt J. Haas +1 more
TL;DR: This article takes advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks and uses replication and new cryptographic schemes to build a highly secure and highly available key management service, which terms the core of this security framework.
Book ChapterDOI
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
TL;DR: It is shown how to distribute a secret to n persons such that each person can verify that he has received correct information about the secret without talking with other persons.