TY - JOUR
T1 - AC-PKI
T2 - 2005 IEEE International Conference on Communications (ICC 2005)
AU - Zhang, Yanchao
AU - Liu, Wei
AU - Lou, Wenjing
AU - Fang, Yuguang
AU - Kwon, Younggoo
N1 - Publication details (e.g. title, author(s), publication statuses and dates) are captured on an “AS IS” and “AS AVAILABLE” basis at the time of record harvesting from the data source. Suggestions for further amendments or supplementary information can be sent to [email protected].
PY - 2005
Y1 - 2005
N2 - This paper studies public-key management, a fundamental problem in providing security support for mobile ad hoc networks. The infrastructureless nature and network dynamics of ad hoc networks make the conventional certificate-based public-key solutions less suitable. To tackle this problem, we propose a novel Anonymous and Certificateless Public-Key Infrastructure (AC-PKI) for ad hoc networks. AC-PKI enables public-key services with certificateless public keys and thus avoids the complicated certificate management inevitable in conventional certificate-based solutions. To satisfy the demand for private keys during network operation, we employ the secret-sharing technique to distribute a system master-key among a pre-selected set of nodes, called D-PKGs, which offer a collaborative private-key-generation service. In addition, we identify pinpoint attacks against D-PKGs and propose anonymizing D-PKGs as the countermeasure. Moreover, we determine the optimal secret-sharing parameters to achieve the maximum security. © 2005 IEEE.
AB - This paper studies public-key management, a fundamental problem in providing security support for mobile ad hoc networks. The infrastructureless nature and network dynamics of ad hoc networks make the conventional certificate-based public-key solutions less suitable. To tackle this problem, we propose a novel Anonymous and Certificateless Public-Key Infrastructure (AC-PKI) for ad hoc networks. AC-PKI enables public-key services with certificateless public keys and thus avoids the complicated certificate management inevitable in conventional certificate-based solutions. To satisfy the demand for private keys during network operation, we employ the secret-sharing technique to distribute a system master-key among a pre-selected set of nodes, called D-PKGs, which offer a collaborative private-key-generation service. In addition, we identify pinpoint attacks against D-PKGs and propose anonymizing D-PKGs as the countermeasure. Moreover, we determine the optimal secret-sharing parameters to achieve the maximum security. © 2005 IEEE.
UR - http://www.scopus.com/inward/record.url?scp=24144449947&partnerID=8YFLogxK
UR - https://www.scopus.com/record/pubmetrics.uri?eid=2-s2.0-24144449947&origin=recordpage
U2 - 10.1109/icc.2005.1495073
DO - 10.1109/icc.2005.1495073
M3 - RGC 21 - Publication in refereed journal
SN - 0536-1486
VL - 5
SP - 3515
EP - 3519
JO - Conference Record - International Conference on Communications
JF - Conference Record - International Conference on Communications
M1 - WN28-1
Y2 - 16 May 2005 through 20 May 2005
ER -