期刊文献+

An Improved Ring Signature Scheme without Trusted Key Generation Center for Wireless Sensor Network 被引量:1

An Improved Ring Signature Scheme without Trusted Key Generation Center for Wireless Sensor Network
原文传递
导出
摘要 Security of wireless sensor network (WSN) is a considerable challenge, because of limitation in energy, communication bandwidth and storage. ID-based cryptosystem without checking and storing certificate is a suitable way used in WSN. But key escrow is an inherent disadvantage for traditional ID-based cryptosystem, i.e., the dishonest key generation center (KGC) can forge the signature of any node and on the other hand the node can deny the signature actually signed by him/herself. To solving this problem, we propose an ID-based ring signature scheme without trusted KGC. We also present the accurate secure proof to prove that our scheme is secure against existential forgery on adaptively chosen message and ID attacks assuming the complexity of computational Diffie-Hellman (CDH) problem. Compared with other ring signature schemes, we think proposed scheme is more efficient. Security of wireless sensor network(WSN) is a considerable challenge,because of limitation in energy, communication bandwidth and storage.ID-based cryptosystem without checking and storing certificate is a suitable way used in WSN.But key escrow is an inherent disadvantage for traditional ID-based cryptosystem, i.e.,the dishonest key generation center(KGC) can forge the signature of any node and on the other hand the node can deny the signature actually signed by him/herself.To solving this problem,we propose an ID-based ring signature scheme without trusted KGC.We also present the accurate secure proof to prove that our scheme is secure against existential forgery on adaptively chosen message and ID attacks assuming the complexity of computational Diffie-Hellman(CDH) problem.Compared with other ring signature schemes,we think proposed scheme is more efficient. /T.r/-1/-1\
出处 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第2期189-194,共6页 上海交通大学学报(英文版)
基金 the National Natural Science Foundationof China(No.60773085)
关键词 wireless sensor network SIGNATURE bilinear pairings key escrow trusted key generation center (KGC) 无线传感器网络 签名方案 密钥生成 基于身份的密码体制 信任 密钥托管 带宽和 复杂性
  • 相关文献

参考文献10

  • 1ZHANG F G,,KIM K.ID-based blind signature and ring signature from pairings[].Proc Advanced in Cryptology-Asciacrypt.2002
  • 2MAN H A,LIU J K,YUEN T H,et al.ID-based ring signature scheme secure in the standard model[].Proc IWSEC.2003
  • 3XIAO J F,ZENG G H.Improved threshold ring signature for ad-hoc group[].Proc International Conference on Wireless CommunicatioinNetworking and Mobile Computing.2003
  • 4CHEN X,ZHANG F G,KIM K.A new ID-based group signature scheme from bilinear pairings[].Proc WISA‘.2003
  • 5BELLARE M,NAMPREMPRE C,NEVEN G.Security proofs for identity-based identification and signature schemes[].Proc Advances in Cryptology-Eurocrypt‘.2004
  • 6Rivest R L,Shamir A,Tauman Y.How to Leak a Secret[].Advances in Cryptology-Asiacrypt.2001
  • 7Shamir A.Identity-based cryptosystems and signature schemes[].Proceedings of International Conference on Advances in Cryptology CRYPTO’.1984
  • 8Al-Riyami SS,Paterson KG.Certificateless public key cryptography[].Advances in Cryptography-Asiacry-pt’.2003
  • 9Boneh D,Franklin M.Identity-based encryption from the Weil pairing[].Proceeding of Advances in Cryptology-Crypto’.2001
  • 10GENTRY C.Certificate-based encryption and the certificate revocationproblem[].Advances in Cryptology-Eurocrypt’.2003

同被引文献12

  • 1Mukherjee P,Sen S.Comparing reputation schemes for detecting malicious nodes in sensor networks[].Computer Journal.2011
  • 2Wang Fei,Wang Fu-rong,Huang Ben-xiong,et al.SONR: A reliable reputation system of self-organized network[].Journal of Network and Computer Applications.2012
  • 3OZDEMIR S.Functional reputation based reliable data aggregation and transmission for wireless sensor networks[].Computer Communications.2008
  • 4F. G. Marmol,G. M. Pérez."Security threats scenarios in trust and reputation models for distributed systems,"[].Computers and Security.2009
  • 5Zouridaki C,Mark B L,Hejmo M,et al.E-Hermes: a robust cooperative trust establishment scheme for mobile ad hoc networks[].Ad Hoc Networks.2009
  • 6Omar M,Challal Y,Bouabdallah A.Reliable and fully distributed trust model for mobile ad hoc networks[].Computers and Security.2009
  • 7Ganeriwal S,Balzano L,Srivastava M.Reputation-based framework for high integrity sensor networks[].ACM Transactions on Sensor Networks (TOSN).2008
  • 8Marmol FG,Perez GM.Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems[].Computers and Standards.2010
  • 9G. Casella,R.L. Berger.Statistical Inference[]..1990
  • 10Azzedine Boukerche,,Yonglin Ren.A trust-based security system for ubiquitous and pervasive computing environments[].Computer Communications.2008

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部