Key management using certificateless public key cryptography in ad hoc networks

Fagen Li, Masaaki Shirase, Tsuyoshi Takagi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

As various applications of wireless ad hoc network have been proposed, security has become one of the big research challenges and is receiving increasing attention. In this paper, we propose a distributed key management approach by using the recently developed concepts of certificateless public key cryptography and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. Certificateless public key cryptography is applied here not only to eliminate the need for certificates, but also to retain the desirable properties of identity-based key management approaches without the inherent key escrow problem.

Original languageEnglish
Title of host publicationNetwork and Parallel Computing - IFIP International Conference, NPC 2008, Proceedings
Pages116-126
Number of pages11
DOIs
Publication statusPublished - Dec 8 2008
EventIFIP International Conference on Network and Parallel Computing, NPC 2008 - Shanghai, China
Duration: Oct 18 2008Oct 20 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5245 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherIFIP International Conference on Network and Parallel Computing, NPC 2008
CountryChina
CityShanghai
Period10/18/0810/20/08

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Key management using certificateless public key cryptography in ad hoc networks'. Together they form a unique fingerprint.

  • Cite this

    Li, F., Shirase, M., & Takagi, T. (2008). Key management using certificateless public key cryptography in ad hoc networks. In Network and Parallel Computing - IFIP International Conference, NPC 2008, Proceedings (pp. 116-126). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5245 LNCS). https://doi.org/10.1007/978-3-540-88140-7-11