A Secure Distributed Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET

被引:0
作者
Wang Xingfu [1 ]
Lu Qiwei [1 ]
Xiong Yan [1 ]
Miao Fuyou [1 ]
Huang Wenchao [1 ]
Liu Tao [2 ]
Wu Xuangou [3 ]
机构
[1] Univ Sci & Technol China, Sch Comp Sci & Technol, Hefei 230027, Peoples R China
[2] Anhui Polytech Univ, Sch Comp & Informat, Wuhu 241000, Peoples R China
[3] Anhui Univ Technol, Sch Comp Sci, Maanshan 243032, Peoples R China
基金
中国国家自然科学基金;
关键词
Secret sharing; Trusted computing; Authentication; Chinese remainder theorem;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the rapid development of Mobile ad hoc network (MANET), secure and practical authentication is becoming increasingly important. There still exist several unsolved problems. It may suffer from cheating problems and Denial of services (DoS) attacks towards authentication service. Most existing schemes do not have satisfactory efficiency due to the exponential arithmetic complexity of Shamir's scheme. We explore the property of Verifiable secret sharing (VSS) schemes with Chinese remainder theorem (CRT), then propose a secret key distributed storage scheme based on CRT-VSS and trusted computing techniques. We discuss the homomorphism property of CRT-VSS and design a secure distributed Elliptic curve-digital signature standard (ECCDSS) authentication scheme. We provide formal guarantees towards the scheme proposed in this paper.
引用
收藏
页码:284 / 290
页数:7
相关论文
共 18 条
[1]   A MODULAR APPROACH TO KEY SAFEGUARDING [J].
ASMUTH, C ;
BLOOM, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :208-210
[2]  
Bagherzandi A, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P433
[3]  
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[4]  
Benaloh Cohen, 1986, CRYPTO P CRYPT
[5]  
Brickell E., 2004, P ACM C COMP COMM SE, P132, DOI DOI 10.1109/TSC.2010.60
[6]  
Chen LQ, 2008, LECT NOTES COMPUT SC, V5222, P31, DOI 10.1007/978-3-540-85886-7_3
[7]  
Gennaro R, 1996, LECT NOTES COMPUT SC, V1070, P354
[8]  
Hoare C. A. R., 1985, Communicating Sequential Processes.
[9]  
Iftene S., 2006, SCI ANN CUZA U, V16, P63
[10]  
Kaya K, 2008, LECT NOTES COMPUT SC, V5023, P94