A distributed secret share update scheme with public verifiability for ad hoc network

In this paper, a distributed secret share update scheme with public verifiability for ad hoc network is proposed, in which the system secret key is collaboratively generated by k nodes or more, instead of by a centralized key generation center. To prevent a passive adversary from collecting other nodes’ shares to compromise the system key over a long period, each node can periodically refresh its share without changing the system key. At the same time, to resist an active adversary to forge partial share and even to solve the accusation problem, any one can publicly verify the correctness of partial shares submitted by other nodes in the share update phase. To achieve our goals, we explore the technique of verifiable encryption with additive homomorphism and that of threshold cryptography. The analysis shows that the proposed scheme is more secure and efficient than the previous schemes for ad hoc networks. Copyright © 2014 John Wiley & Sons, Ltd.

[1]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[2]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[3]  Akshai Aggarwal,et al.  A key management and secure routing integrated framework for Mobile Ad-hoc Networks , 2013, Ad Hoc Networks.

[4]  P. Suresh Varma,et al.  Security Challenges and Attacks in Mobile Ad Hoc Networks , 2013 .

[5]  G. Pulla,et al.  A SURVEY ON TRUST MANAGEMENT FOR MOBILE AD HOC NETWORKS , 2010 .

[6]  Yangmin Li,et al.  A verifiable dynamic threshold key management scheme based on bilinear pairing without a trusted party in mobile ad hoc network , 2012, 2012 IEEE International Conference on Automation and Logistics.

[7]  Jan Camenisch,et al.  Practical Verifiable Encryption and Decryption of Discrete Logarithms , 2003, CRYPTO.

[8]  Siu-Ming Yiu,et al.  Providing distributed certificate authority service in cluster-based mobile ad hoc networks , 2007, Comput. Commun..

[9]  Jiafu Wan,et al.  Issues and Challenges of Wireless Sensor Networks Localization in Emerging Applications , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[10]  Lung-Chung Li,et al.  Securing Cluster-Based Ad Hoc Networks with Distributed Authorities , 2010, IEEE Transactions on Wireless Communications.

[11]  Jin-Hee Cho,et al.  Composite trust-based public key management in mobile ad hoc networks , 2013, SAC '13.

[12]  Haiyun Luo,et al.  Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.

[13]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[14]  Baruch Awerbuch,et al.  Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).

[15]  Siu-Ming Yiu,et al.  An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.

[16]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[17]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[18]  I. A. Choudhry,et al.  Secure Key Management and Verification of Mobile Ad Hoc Networks , 2013 .

[19]  Hugo Krawczyk,et al.  Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.