A Pseudonym-based Signature Scheme for Dynamic Clusters in Ad Hoc Networks

被引:0
作者
Zhang, Yang [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
来源
NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY | 2009年
关键词
Anonymity; Pseudonym System; Digital Signature Scheme; Ad Hoc Network; ANONYMOUS CREDENTIALS; SECURITY;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nodes in ad hoc networks often self-organize into clusters in which a node need anonymously prove the membership in some scenarios. For a self-organized cluster, any node should have the capacity to act as the cluster manger and use varying pseudonyms to keep privacy while the procedure of reissuing key is not desirable. Dynamic group signature schemes provide a probable solution, but are inappropriate because no incorruptible online TA (Trusted Authority) exists to run a group-key generation algorithm in the corruptible clusters of an ad hoc network, the opening capability are not absolutely necessary for a temporary cluster, and how to generate pseudonyms are not specified. To resolve the above problem, this paper proposes a pseudonym-based signature scheme where pseudonyms can be self-generated and messages can be bound to the self-generated pseudonyms. After the TA offline issues keys to all nodes, cluster managers can be dynamically elected and compute the public cluster-keys, which allow a node to dynamically join or leave the cluster by updating its restriction pseudonym. Then, only cluster members can sign messages on behalf of the cluster. Because the pseudonyms are self-updated and not directly bound to certificates, the signature scheme based on them must satisfy some new requirements. Hence, we formalize a security model for pseudonym-based signature schemes. The security of our scheme is proved in the random oracle model.
引用
收藏
页码:208 / 215
页数:8
相关论文
共 19 条
  • [1] Barreto PSLM, 2002, LECT NOTES COMPUT SC, V2442, P354
  • [2] BELENKIY M, THEOR CRYPT C TCC 20
  • [3] Bellare M, 2005, LECT NOTES COMPUT SC, V3376, P136
  • [4] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [5] Brickell E., 2004, P 11 ACM C COMPUTER, P132
  • [6] Camenisch J, 2004, LECT NOTES COMPUT SC, V3152, P56
  • [7] Camenisch J, 2003, LECT NOTES COMPUT SC, V2576, P268
  • [8] Camenisch J, 2001, LECT NOTES COMPUT SC, V2045, P93
  • [9] CHAUM D, 1991, LECT NOTES COMPUT SC, V547, P257
  • [10] CHAUM D, 1985, COMMUN ACM, V28, P1030, DOI 10.1145/4372.4373