Key escrow is an inherent disadvantage for traditional ID-based cryptosystem, i.e., the dishonest private key generator (PKG) can forge the signature of any user, meanwhile, the user can deny the signature actually si...Key escrow is an inherent disadvantage for traditional ID-based cryptosystem, i.e., the dishonest private key generator (PKG) can forge the signature of any user, meanwhile, the user can deny the signature actually signed by him/herself. To avoid the keyescrow problem, an ID-based signature scheme was presented without trusted PKG. The exact proof of security was presented to demonstrate that our scheme is secure against existential forgery on adaptively chosen message and ID attacks assuming the complexity of computational Diffie-Hellman (CDH) problem. Compared with other signature schemes, the proposed scheme is more efficient.展开更多
A complex threshold key management framework has been proposed, which canaddress the challenges posed by the unique nature of Ad hoc network. Depending on the cooperation ofthe controller and participation nodes, this...A complex threshold key management framework has been proposed, which canaddress the challenges posed by the unique nature of Ad hoc network. Depending on the cooperation ofthe controller and participation nodes, this scheme should be efficient in the operationenvironmental alteration and toleianl faults of node, which take the advantages of the benefits ofboth key management approaches and alleviate their limitations. For the cooperation of thecontroller and participation nodes, a (t, n) threshold Elliptic curve sign-encryption scheme withthe specified receiver also has been proposed. Using this threshold sign-encryption scheme, the keymanagement distributes the trust between a controller and a set of participation nodes.展开更多
Advanced metering infrastructure( AMI) is a critical part of the smart grid,and ZigBee is playing an increasingly important role in AMI.The cyber security is the prerequisite to ensure the reliable operation of AMI.To...Advanced metering infrastructure( AMI) is a critical part of the smart grid,and ZigBee is playing an increasingly important role in AMI.The cyber security is the prerequisite to ensure the reliable operation of AMI.To guarantee the ZigBee communication security in AMI,a key management scheme based on the elliptic curve cryptosystem( ECC) is proposed.According to the ways of information transformation in AMI,the scheme is categorized as unicast communication key management process and multicast communication key management process.And in the scheme,the selection of elliptic curve,the calculation of ZigBee node's ECC public key and private key,the establishment and distribution of the link key in unicast communication,and the establishment and distribution of the network key in multicast communication are elaborated.The analysis results show that the proposed key management scheme is secure,and consumes less memory and energy,thus,can meet the demands of communication security of AMI.展开更多
Smart Grids(SGs)are introduced as a solution for standard power dis-tribution.The significant capabilities of smart grids help to monitor consumer behaviors and power systems.However,the delay-sensitive network faces n...Smart Grids(SGs)are introduced as a solution for standard power dis-tribution.The significant capabilities of smart grids help to monitor consumer behaviors and power systems.However,the delay-sensitive network faces numer-ous challenges in which security and privacy gain more attention.Threats to trans-mitted messages,control over smart grid information and user privacy are the major concerns in smart grid security.Providing secure communication between the service provider and the user is the only possible solution for these security issues.So,this research work presents an efficient mutual authentication and key agreement protocol for smart grid communication using elliptic curve crypto-graphy which is robust against security threats.A trust authority module is intro-duced in the security model apart from the user and service provider for authentication.The proposed approach performance is verified based on different security features,communication costs,and computation costs.The comparative analysis of experimental results demonstrates that the proposed authentication model attains better performance than existing state of art of techniques.展开更多
In key escrow field it is important to solve the problem thatuser's secret key completely depends on the trusted escrow agency. In 1995, some methods of solving the problem were presented. But these methods are no...In key escrow field it is important to solve the problem thatuser's secret key completely depends on the trusted escrow agency. In 1995, some methods of solving the problem were presented. But these methods are no better than that of directly using threshold cryptography. In this paper, we present a common pattern of threshold key escrow scheme based on public key cryptosystem, and a detailed design based on the improved RSA algorithm is given. The above problem is solved by this scheme.展开更多
An ad-hoc sensor network(ASN)is a group of sensing nodes that transmit data over a wireless link to a target node,direct or indirect,through a series of nodes.ASN becomes a high-risk group for several security exploit...An ad-hoc sensor network(ASN)is a group of sensing nodes that transmit data over a wireless link to a target node,direct or indirect,through a series of nodes.ASN becomes a high-risk group for several security exploits due to the sensor node’s limited resources.Internal threats are more challenging to protect against than external attacks.The nodes are grouped,and calculate each node’s trust level.The trust level is the result of combining internal and external trust degrees.Cluster heads(CH)are chosen based on the anticipated trust levels.The communications are then digitally signed by the source,encoded using a key pair given by a trustworthy CH,decoded by the recipient,and supervised by verifications.It authenticates the technique by identifying the presence of both the transmitter and the recipient.Our approach looks for a trustworthy neighboring node that meets the trust threshold condition to authenticate the key produced.The companion node reaffirms the node’s reliability by getting the public-key certification.The seeking sensor node and the certification issuer node must have a close and trusting relationship.The results of the proposed hybrid authentication using a node trustworthy(HANT)system are modeled and tested,and the suggested approach outperforms conventional trust-based approaches in throughput,latency,lifetime,and vulnerability methods.展开更多
An accountable authority attribute-based encryption (A-ABE) scheme is presented in this paper. The notion of accountable authority identity-based encryption (A-IBE) was first introduced by Goyal at Crypto'07. It ...An accountable authority attribute-based encryption (A-ABE) scheme is presented in this paper. The notion of accountable authority identity-based encryption (A-IBE) was first introduced by Goyal at Crypto'07. It is a novel approach to mitigate the (inherent) key escrow problem in identity-based cryptosystems. In this work, the concept of accountable authority to attribute-based encryption (ABE) setting is generalized for the first time, and then a construction is given. The scheme non-trivially integrates an A-IBE scheme proposed by Libert et al. with an ABE scheme. In our construction, a user will be identified by a pair ( id, o~), where id denotes the user' s identity and ω denotes the set of attributes associated to the user. In addition, our construction is shown to be secure under some reasonable assumptions.展开更多
We present a new approach to reduct the com--munication overhead caused bythreshold cryptography using modified multicast protocol and certificate proxy technology. Servernodes maintain a few multicast groups proactiv...We present a new approach to reduct the com--munication overhead caused bythreshold cryptography using modified multicast protocol and certificate proxy technology. Servernodes maintain a few multicast groups proactively. A client wanting to updateits certificatemulticasts its request to a server nocks group through its certificate proxy. At periodic intervals,server nodes refresh their shares of the private key of certificate authority using multicast.展开更多
文摘Key escrow is an inherent disadvantage for traditional ID-based cryptosystem, i.e., the dishonest private key generator (PKG) can forge the signature of any user, meanwhile, the user can deny the signature actually signed by him/herself. To avoid the keyescrow problem, an ID-based signature scheme was presented without trusted PKG. The exact proof of security was presented to demonstrate that our scheme is secure against existential forgery on adaptively chosen message and ID attacks assuming the complexity of computational Diffie-Hellman (CDH) problem. Compared with other signature schemes, the proposed scheme is more efficient.
文摘A complex threshold key management framework has been proposed, which canaddress the challenges posed by the unique nature of Ad hoc network. Depending on the cooperation ofthe controller and participation nodes, this scheme should be efficient in the operationenvironmental alteration and toleianl faults of node, which take the advantages of the benefits ofboth key management approaches and alleviate their limitations. For the cooperation of thecontroller and participation nodes, a (t, n) threshold Elliptic curve sign-encryption scheme withthe specified receiver also has been proposed. Using this threshold sign-encryption scheme, the keymanagement distributes the trust between a controller and a set of participation nodes.
基金Sponsored by the National Natural Science Foundation of China(Grant No.51077015)the Fundamental Research Funds for the Central Universities(Grant No.HIT.NSRIF.2015017)
文摘Advanced metering infrastructure( AMI) is a critical part of the smart grid,and ZigBee is playing an increasingly important role in AMI.The cyber security is the prerequisite to ensure the reliable operation of AMI.To guarantee the ZigBee communication security in AMI,a key management scheme based on the elliptic curve cryptosystem( ECC) is proposed.According to the ways of information transformation in AMI,the scheme is categorized as unicast communication key management process and multicast communication key management process.And in the scheme,the selection of elliptic curve,the calculation of ZigBee node's ECC public key and private key,the establishment and distribution of the link key in unicast communication,and the establishment and distribution of the network key in multicast communication are elaborated.The analysis results show that the proposed key management scheme is secure,and consumes less memory and energy,thus,can meet the demands of communication security of AMI.
文摘Smart Grids(SGs)are introduced as a solution for standard power dis-tribution.The significant capabilities of smart grids help to monitor consumer behaviors and power systems.However,the delay-sensitive network faces numer-ous challenges in which security and privacy gain more attention.Threats to trans-mitted messages,control over smart grid information and user privacy are the major concerns in smart grid security.Providing secure communication between the service provider and the user is the only possible solution for these security issues.So,this research work presents an efficient mutual authentication and key agreement protocol for smart grid communication using elliptic curve crypto-graphy which is robust against security threats.A trust authority module is intro-duced in the security model apart from the user and service provider for authentication.The proposed approach performance is verified based on different security features,communication costs,and computation costs.The comparative analysis of experimental results demonstrates that the proposed authentication model attains better performance than existing state of art of techniques.
基金This work was supported by the National Natural Science Foundation of China (Grant Nos. 69772037, 60072018).
文摘In key escrow field it is important to solve the problem thatuser's secret key completely depends on the trusted escrow agency. In 1995, some methods of solving the problem were presented. But these methods are no better than that of directly using threshold cryptography. In this paper, we present a common pattern of threshold key escrow scheme based on public key cryptosystem, and a detailed design based on the improved RSA algorithm is given. The above problem is solved by this scheme.
文摘An ad-hoc sensor network(ASN)is a group of sensing nodes that transmit data over a wireless link to a target node,direct or indirect,through a series of nodes.ASN becomes a high-risk group for several security exploits due to the sensor node’s limited resources.Internal threats are more challenging to protect against than external attacks.The nodes are grouped,and calculate each node’s trust level.The trust level is the result of combining internal and external trust degrees.Cluster heads(CH)are chosen based on the anticipated trust levels.The communications are then digitally signed by the source,encoded using a key pair given by a trustworthy CH,decoded by the recipient,and supervised by verifications.It authenticates the technique by identifying the presence of both the transmitter and the recipient.Our approach looks for a trustworthy neighboring node that meets the trust threshold condition to authenticate the key produced.The companion node reaffirms the node’s reliability by getting the public-key certification.The seeking sensor node and the certification issuer node must have a close and trusting relationship.The results of the proposed hybrid authentication using a node trustworthy(HANT)system are modeled and tested,and the suggested approach outperforms conventional trust-based approaches in throughput,latency,lifetime,and vulnerability methods.
基金Supported by the National Natural Science Foundation of China(No.60970111,60903189,60903020)the National High Technology Research and Development Programme of China(No.2009AA012418)+1 种基金the National Basic Research Program of China(No.2007CB311201)the Foundation of NLMC(No.9140C1103020803)
文摘An accountable authority attribute-based encryption (A-ABE) scheme is presented in this paper. The notion of accountable authority identity-based encryption (A-IBE) was first introduced by Goyal at Crypto'07. It is a novel approach to mitigate the (inherent) key escrow problem in identity-based cryptosystems. In this work, the concept of accountable authority to attribute-based encryption (ABE) setting is generalized for the first time, and then a construction is given. The scheme non-trivially integrates an A-IBE scheme proposed by Libert et al. with an ABE scheme. In our construction, a user will be identified by a pair ( id, o~), where id denotes the user' s identity and ω denotes the set of attributes associated to the user. In addition, our construction is shown to be secure under some reasonable assumptions.
文摘We present a new approach to reduct the com--munication overhead caused bythreshold cryptography using modified multicast protocol and certificate proxy technology. Servernodes maintain a few multicast groups proactively. A client wanting to updateits certificatemulticasts its request to a server nocks group through its certificate proxy. At periodic intervals,server nodes refresh their shares of the private key of certificate authority using multicast.