An Information Aggregation Scheme of Multi-node in Ubiquitous Sensor Networks

Mobile networking, mobile systems and applications and ubiquitous computing infrastructures are of strongly growing importance in the IT sector in general, and for the parallel and distributed computing community. Particularly, when an signed(authenticated) information of multi-node is aggregated in ubiquitous sensor networks, the number of the signing information is very small. Thus, signature scheme which signs information has strong unforgeability. In 2005 Yu and Chen proposed threshold signature scheme [12]. Their scheme has a high efficiency. But, their scheme is not suitable for ubiquitous sensor networks because their scheme has no strong unforgeability. In this paper, we modify their scheme so that modified scheme is suitable for ubiquitous sensor networks. Also, our scheme has a good efficiency, and a smaller secret key than other cryptosystems with a similar security level.

[1]  Christof Paar,et al.  Cryptographic Hardware and Embedded Systems - CHES 2002 , 2003, Lecture Notes in Computer Science.

[2]  Yvo Desmedt,et al.  Threshold Cryptosystems , 1989, CRYPTO.

[3]  Daniel W. Engels,et al.  RFID Systems and Security and Privacy Implications , 2002, CHES.

[4]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[5]  Scott A. Vanstone,et al.  Elliptic curve cryptosystems using curves of smooth order over the ring Zn , 1997, IEEE Trans. Inf. Theory.

[6]  Michael Wiener,et al.  Advances in Cryptology — CRYPTO’ 99 , 1999 .

[7]  Frank Stajano,et al.  Security for Ubiquitous Computing , 2002, ICISC.

[8]  Mark Weiser,et al.  Some computer science issues in ubiquitous computing , 1993, CACM.

[9]  Mark Weiser,et al.  Some Computer Science Problems in Ubiquitous Computing , 1993 .

[10]  Tzer-Shyong Chen,et al.  An efficient threshold group signature scheme , 2004 .

[11]  Aggelos Kiayias,et al.  Public Key Cryptography - PKC 2006 , 2006, Lecture Notes in Computer Science.

[12]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[13]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[14]  Alfred Menezes,et al.  Elliptic Curves and Cryptography , 1999 .

[15]  Tzer-Shyong Chen,et al.  An efficient threshold group signature scheme , 2004, 2004 IEEE Region 10 Conference TENCON 2004..

[16]  Brent Waters,et al.  Strongly Unforgeable Signatures Based on Computational Diffie-Hellman , 2006, Public Key Cryptography.