AC-PKI: Anonymous and certificateless public-key infrastructure for mobile ad hoc networks

Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang, Younggoo Kwon

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

46 Citations (Scopus)

Abstract

This paper studies public-key management, a fundamental problem in providing security support for mobile ad hoc networks. The infrastructureless nature and network dynamics of ad hoc networks make the conventional certificate-based public-key solutions less suitable. To tackle this problem, we propose a novel Anonymous and Certificateless Public-Key Infrastructure (AC-PKI) for ad hoc networks. AC-PKI enables public-key services with certificateless public keys and thus avoids the complicated certificate management inevitable in conventional certificate-based solutions. To satisfy the demand for private keys during network operation, we employ the secret-sharing technique to distribute a system master-key among a pre-selected set of nodes, called D-PKGs, which offer a collaborative private-key-generation service. In addition, we identify pinpoint attacks against D-PKGs and propose anonymizing D-PKGs as the countermeasure. Moreover, we determine the optimal secret-sharing parameters to achieve the maximum security. © 2005 IEEE.
Original languageEnglish
Article numberWN28-1
Pages (from-to)3515-3519
JournalConference Record - International Conference on Communications
Volume5
DOIs
Publication statusPublished - 2005
Externally publishedYes
Event2005 IEEE International Conference on Communications (ICC 2005) - Seoul, Korea, Republic of
Duration: 16 May 200520 May 2005

Bibliographical note

Publication details (e.g. title, author(s), publication statuses and dates) are captured on an “AS IS” and “AS AVAILABLE” basis at the time of record harvesting from the data source. Suggestions for further amendments or supplementary information can be sent to [email protected].

Fingerprint

Dive into the research topics of 'AC-PKI: Anonymous and certificateless public-key infrastructure for mobile ad hoc networks'. Together they form a unique fingerprint.

Cite this