Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks

Recently, Identity-Based Cryptography (IBC) schemes have been considered as a tool to secure Mobile Ad Hoc Networks (MANETs) due to the efficient key management of the schemes. In this work, we focus on the role of the Key Generation Centre (KGC) as a key escrow, a property that is inherent to all IBC schemes. We explore the special role of key escrow in MANETs and show that this role significantly differs from key escrows in other networks. We introduce two adversary models for dishonest KGCs in MANETs, including a new spy model where a KGC uses so-called spy nodes that record communications in the network and report them to the KGC. We discuss the two faces of key escrow in MANETs, where our analytical results show that in many MANET applications the KGC can be prevented from being a key escrow. On the other hand, the results of this paper illustrate how a KGC can utilise spy nodes to monitor nodes in a MANET, as needed in some applications.

[1]  Dharma P. Agrawal,et al.  Threshold and identity-based key management and authentication for wireless ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[2]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[3]  Craig Gentry,et al.  Certificate-Based Encryption and the Certificate Revocation Problem , 2003, EUROCRYPT.

[4]  Kenneth G. Paterson,et al.  Key Agreement Using Statically Keyed Authenticators , 2004, ACNS.

[5]  Liqun Chen,et al.  Applications of Multiple Trust Authorities in Pairing Based Cryptosystems , 2002, InfraSec.

[6]  William A. Arbaugh,et al.  Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[7]  Florian Hess,et al.  Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.

[8]  Guang Gong,et al.  Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation , 2006 .

[9]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[10]  Kenneth G. Paterson,et al.  Cryptography from Pairings: A Snapshot of Current Research , 2008 .

[11]  Byoungcheon Lee,et al.  Secure Key Issuing in ID-based Cryptography , 2004, ACSW.

[12]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[13]  Sang-Jae Moon,et al.  How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes , 2005, ICISS.