WANG Xingfu, LU Qiwei, XIONG Yan, MIAO Fuyou, HUANG Wenchao, LIU Tao, WU Xuangou. A Secure Distributed Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET[J]. Chinese Journal of Electronics, 2014, 23(2): 284-290.
Citation: WANG Xingfu, LU Qiwei, XIONG Yan, MIAO Fuyou, HUANG Wenchao, LIU Tao, WU Xuangou. A Secure Distributed Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET[J]. Chinese Journal of Electronics, 2014, 23(2): 284-290.

A Secure Distributed Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET

Funds:  The research is supported by National Natural Science Foundation of China under Grant (No.61202404, No.61170233, No.61232018, No.61272472, No.61272317, No.61300170), the Fundamental Research Funds for the Central Universities (No. WK0110000036) and University Provincial Natural Science Foundation of Anhui Province (No.KJ2013A040).
  • Received Date: 2013-06-01
  • Rev Recd Date: 2013-08-01
  • Publish Date: 2014-04-05
  • With the rapid development of Mobile ad hoc network (MANET), secure and practical authentication is becoming increasingly important. There still exist several unsolved problems. It may suffer from cheating problems and Denial of services (DoS) attacks towards authentication service. Most existing schemes do not have satisfactory efficiency due to the exponential arithmetic complexity of Shamir's scheme. We explore the property of Verifiable secret sharing (VSS) schemes with Chinese remainder theorem (CRT), then propose a secret key distributed storage scheme based on CRT-VSS and trusted computing techniques. We discuss the homomorphism property of CRT-VSS and design a secure distributed Elliptic curve-digital signature standard (ECCDSS) authentication scheme. We provide formal guarantees towards the scheme proposed in this paper.
  • loading
  • Adi Shamir, "How to share a secret", Commun. ACM, Vol.22, pp.612-613, 1979.
    Xiong Yan, Miao Fuyou, Zhang Weichao, and WANG Xingfu, "Distributed authentication based on multi-hop signing with encrypted signature functions in mobile ad hoc networks", Acta Electronica Sinica, Vol.31, No.2, pp.161-165, 2003.
    Kamer Kaya and Ali Selçuk, "Robust threshold schemes based on the chinese remainder theorem", Progress in Cryptology C AFRICACRYPT 2008, Lecture Notes in Computer Science, Vol.5023, pp.94-108, Springer Berlin / Heidelberg, 2008.
    R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, "Robust threshold dss signatures", Advances in Cryptology EUROCRYPT96, pp.354-371, Springer, 1996.
    Ernie Brickell, Jan Camenisch, and Liqun Chen, "Direct anonymous attestation", Proceedings of the 11th ACM conference on Computer and communications security, CCS 04, ACM, pp.132-145, New York, NY, USA, 2004.
    Liqun Chen, Hans Löhr, Mark Manulis, and Ahmad-Reza Sadeghi, "Property-based attestation without a trusted third party", Lecture Notes in Computer Science, Vol.5222, ISC, pp.31-46. Springer, 2008.
    Wenchao Huang, Yan Xiong, and Depin Chen, "Daaodv: A secure ad hoc routing protocol based on direct anonymous attestation", Proc. Int. Conf. Computational Science and Engineering CSE 09, Vol.2, pp.809-816, 2009.
    Qiwei Lu, Yan Xiong, Xudong Gong, and Wenchao Huang, "Secure collaborative outsourced data mining with multi-owner in cloud computing", Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, IEEE, pp.100-108. 2012.
    Charles Asmuth and John Bloom, "A modular approach to key safeguarding", Information Theory, IEEE Transactions, Vol.29, No.2, pp.208-210, 1983.
    K. Kaya and A. Selçuk, "A verifiable secret sharing scheme based on the chinese remainder theorem", Progress in Cryptology-INDOCRYPT 2008, pp.414-425, 2008.
    Cohen Benaloh, "Secret sharing homomorphisms: Keeping shares of a secret secret (extended abstract)", CRYPTO: Proceedings of Crypto, 1986.
    Sorin Iftene, "Secret sharing schemes with applications in security protocols", Sci. Ann. Cuza Univ., Vol.16, pp.63-96, 2006.
    M. Ben-Or, S. Goldwasser, and A. Wigderson, "Completeness theorems for non-cryptographic fault-tolerant distributed computation", Proceedings of the twentieth annual ACM symposium on Theory of computing, ACM, pp.1-10, 1988.
    Ali Bagherzandi, Stanislaw Jarecki, Nitesh Saxena, and Yanbin Lu, "Password-protected secret sharing", ACM Conference on Computer and Communications Security, pp.433-444, 2011.
    Lidong Zhou and Z.J. Haas, "Securing ad hoc networks", Network, IEEE, Vol.13, No.6, pp.24-30, 1999.
    C. A. R. Hoare, Communicating Sequential Processes, Prentice-Hall, 1985.
    Steve Schneider, "Verifying authentication protocols in csp", IEEE Trans. Software Eng., Vol.24, No.9, pp.741-758, 1998.
    G. Lowe, "Breaking and fixing the needham-schroeder publickey protocol using fdr", Tools and Algorithms for the Construction and Analysis of Systems, pp.147-166, 1996.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (335) PDF downloads(3147) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return