Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
Dynamic ad hoc networks facilitate interconnections between mobile devices without the support of any network infrastructure. In this paper, we propose a secure identity-based ad hoc protocol for mobile devices to construct a group key for a setup of a secure communication network in an efficient way and support dynamic changing of network topology. Unlike group key management protocols proposed previously in the literature, mobile devices can use our protocol to construct the group key by observing the others' identity, like the MAC address, which distinguishes the device from the others. In contrast to other interactive protocols, we only need one broadcast to setup the group key and member removal is also highly efficient. Finally, we discuss the security issues and provide security proofs for our protocol.
Rocznik
Tom
Strony
24--29
Opis fizyczny
Bibliogr.14 poz.
Twórcy
autor
autor
autor
- School of Information Technology and Computer Science, Faculty of Informatics, University of Wollongong, Wollongong, NSW 2522, Australia, cyn27@uow.edu.au
Bibliografia
- [1] W. Diffie and M. E. Hellman, “New directions in cryptography”, IEEE Trans. Inform. Theory, vol. IT-22, no. 6, pp. 644–654, 1976.
- [2] M. Steiner, G. Tsudik, and M. Waidner, “Diffie-Hellman key distribution extended to group communication”, in ACM Conf. Comput. Commun. Secur., New Delhi, India, 1996, pp. 31–37.
- [3] G. Ateniese, M. Steiner, and G. Tsudik, “New multiparty authentication services and key agreement protocols”, IEEE J. Selec. Areas Commun., vol. 18, no. 4, pp. 628–639, 2000.
- [4] E. R. Anton and O. C. M. B. Duarte, “Group key establishment in wireless ad hoc networks”, in Worksh. QoS Mob., Angra dos Reis, Brazil, 2002.
- [5] N. Asokan and P. Ginzboorg, “Key-agreement in ad hoc networks”, Comput. Commun., vol. 23, no. 17, pp. 1627–1637, 2000.
- [6] D. Boneh and A. Silverberg, “Applications of multilinear forms to cryptography”, Cryptol. ePrint Arch., Rep. 2002/080, 2002.
- [7] H. K. Lee, H. S. Lee, and Y. R. Lee, “Multi-party authenticated key agreement protocols from multilinear forms”, Cryptol. ePrint Arch., Rep. 2002/166, 2002.
- [8] A. Joux, “A one round protocol for tripartite Diffie-Hellman”, in Algorithmic Number Theory, 4th International Symposium ANTS-IV, Lecture Notes in Computer Science. Leiden: Springer, 2000, vol. 1838, pp. 385–394.
- [9] R. Barua, R. Dutta, and P. Sarkar, “An n-party key agreement scheme using bilinear map”, Cryptol. ePrint Arch., Rep. 2003/062, 2003.
- [10] A. Shamir, “Identity-based cryptosystems and signature schemes”, in Advances in Cryptology: Proceedings of CRYPTO 84, Lecture Notes in Computer Science. Santa Barbara: Springer, 1984, vol. 196, pp. 47–53.
- [11] D. Boneh and M. Franklin, “Identity based encryption from the weil pairing”, in Advances in Cryptology: Proceedings of CRYPTO’01, Lecture Notes in Computer Science. Santa Barbara: Springer, 2001, vol. 2139, pp. 213–229.
- [12] N. P. Smart, “An identity based authenticated key agreement protocol based on the weil pairing”, Cryptol. ePrint Arch., Rep. 2001/111, 2001.
- [13] D. Nalla, “ID-based tripartite key agreement with signatures”, Cryptol. ePrint Arch., Rep. 2003/144, 2003.
- [14] Y. Mu, V. Varadharajan, and K. Q. Nguyen, “Delegated decryption”, in Proceedings of Cryptography and Coding, Lecture Notes in Computer Science. Cirencester: Springer, 1999, vol. 1746, pp. 258–269.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BAT3-0035-0027