期刊文献+

A Broadcast Signcryption Protocol for Ad Hoc Networks

A Broadcast Signcryption Protocol for Ad Hoc Networks
原文传递
导出
摘要 Many previous broadcast encryption schemes can only guarantee confidentiality but cannot verify integrity and authenticity for broadcast messages. In this paper, a broadcast signcryption protocol for ad hoc networks is proposed based on cluster-based structure. The proposed protocol not only guarantees confidentiality but also verifies integrity and authenticity for broadcast messages. More importantly, the proposed scheme enables the cluster head to robustly add or remove any cluster member without changing secret key of other cluster members. Moreover, the proposed protocol avoids massive message exchange for key setup among cluster members. The analysis of security and performance shows that the proposed protocol is secure, efficient, and more practical protocol for ad hoc networks. Many previous broadcast encryption schemes can only guarantee confidentiality but cannot verify integrity and authenticity for broadcast messages. In this paper, a broadcast signcryption protocol for ad hoc networks is proposed based on cluster-based structure. The proposed protocol not only guarantees confidentiality but also verifies integrity and authenticity for broadcast messages. More importantly, the proposed scheme enables the cluster head to robustly add or remove any cluster member without changing secret key of other cluster members. Moreover, the proposed protocol avoids massive message exchange for key setup among cluster members. The analysis of security and performance shows that the proposed protocol is secure, efficient, and more practical protocol for ad hoc networks.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2011年第5期423-429,共7页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foundation of China (61070164) the Natural Science Foundation of Guangdong Province (81510632010000022) the Science and Technology Planning Project of Guangdong Province (2010B010600025)
关键词 ad hoc networks cluster-based structure broadcast authenticated encryption ad hoc networks cluster-based structure broadcast authenticated encryption
  • 相关文献

参考文献10

  • 1Fiat A, Naor M. Broadcast encryption[C]// Proceedings of CRYPTO'93 (LNCS 773). New York: Springer-Verlag, 1994: 480-491.
  • 2Mu Y, Vmdharajan X. Robust and secure broadcasting[C]// Proceedings of Indocrypt 2001 (LCNS 2247). New York: Springer-Verlag, 2001:223-231.
  • 3Zhang J, Varadharajan V, Mu Y. A novel dynamic key management scheme for secure multicasting[C]//Proceedings of 11 th IEEE International Conference on Networks. Washington D C: IEEE Computer Society, 2003: 391-395.
  • 4Daza V, Herranz J, Morillo P, et al. Ad-Hoc threshold broadcast encryption with shorter ciphertexts[J]. Electronic Notes in Theoretical Computer Science, 2008, 192: 3-15.
  • 5Guo S, Zhang C. Identity-based broadcast encryption scheme with untrusted PKG[C]//Proceedings oflCYCS 2008, Washington D C: IEEE Computer Society, 2008: 1613-1618.
  • 6Hu L, Liu Z. Efficient identity-based broadcast encryption without random Oracles[J]. Journal of Computers, 2010, 5(3): 331-336.
  • 7Gentry C, Waters B. Adaptive Security in Broadcast Encryption Systems[EB/OL]. [2010-09-25]. http://eprint.iacr.org/ 2008/268.
  • 8Bechler M, Hof H J, Kraft D, et al. A cluster-based security architecture for ad hoc networks[C]// Proceedings of 23rd Annual Joint Conference of the IEEE computer and Communications Societies. Washington D C: IEEE Computer Society, 2004: 2393-2403.
  • 9Pointcheval D, Stern J. Security proofs for signature schemes [C]// Advances in Cryptology--Proceedings of EUROCRYPl"96, New York: Springer-Verlag, 1996: 387-398.
  • 10Wu T S, Hsu C L, Tsai K Y, et al. Convertible multi-authenticated encryption scheme[J]. Information Sciences, 2008, 178: 256-263.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部