A distributed secret share update scheme with public verifiability for ad hoc network
In this paper, a distributed secret share update scheme with public verifiability for ad hoc network is proposed, in which the system secret key is collaboratively generated by k nodes or more, instead of by a centralized key generation center. To prevent a passive adversary from collecting other no...
Saved in:
Published in | Security and communication networks Vol. 8; no. 8; pp. 1485 - 1493 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
London
Blackwell Publishing Ltd
25.05.2015
John Wiley & Sons, Inc |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | In this paper, a distributed secret share update scheme with public verifiability for ad hoc network is proposed, in which the system secret key is collaboratively generated by k nodes or more, instead of by a centralized key generation center. To prevent a passive adversary from collecting other nodes' shares to compromise the system key over a long period, each node can periodically refresh its share without changing the system key. At the same time, to resist an active adversary to forge partial share and even to solve the accusation problem, any one can publicly verify the correctness of partial shares submitted by other nodes in the share update phase. To achieve our goals, we explore the technique of verifiable encryption with additive homomorphism and that of threshold cryptography. The analysis shows that the proposed scheme is more secure and efficient than the previous schemes for ad hoc networks. Copyright © 2014 John Wiley & Sons, Ltd.
(1) We design a distributed secret share update scheme with public verifiability for MANET. Our goals are as follows: First, it must not have a single point of failure because mobile nodes deployed in hostile environments are subject to attacks. Second, it should be compromise‐tolerant, meaning that the compromise of a certain number of nodes does not harm the communication security between uncompromised nodes. Third, it should be able to efficiently and securely update and publicly verify the shares of system key. Last, there should be efficient schemes to recover a correct system key. (2) In this paper, we explore the technique of verifiable encryption with additive homomorphism and that of threshold cryptography. A distributed secret share update scheme with public verifiability for ad hoc network is proposed. |
---|---|
Bibliography: | Research Fund for the Doctoral Program of Higher Education of China - No. 20114404120027 National Natural Science Foundation of China - No. 61272435, 61103232 and 61272404 Fundamental Research Funds for the Central Universities - No. GK261001206 Guangdong Natural Science Foundation - No. S2013010011859 istex:9E66D86422E998A0787409DEB906D8B65EA58AFE ArticleID:SEC1097 ark:/67375/WNG-RGRRQRQ2-2 ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
ISSN: | 1939-0114 1939-0122 |
DOI: | 10.1002/sec.1097 |