2012
DOI: 10.1002/sec.529
|View full text |Cite
|
Sign up to set email alerts
|

Virtual private key generator based escrow‐free certificateless public key cryptosystem for mobile ad hoc networks

Abstract: A certificateless public key cryptosystem can make a special contribution to building key distribution and management architecture in resource‐constrained mobile ad hoc networks (MANETs) because it has no separate certificate and no complex certificate management problems. In this paper, we present a virtual private key generator (VPKG)‐based escrow‐free certificateless public key cryptosystem as a novel combination of certificateless and threshold cryptography. Using secret sharing, we build a VPKG whose memb… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…An adversary could still replace un-authenticated public keys to perform a denialof-decryption attack. This attack wastes network resources and [187], [188] proposed to bind the public key of a node to its identity and their ID-based private key to counter this. Furthermore, shares of ID-based private keys are claimed to be distributable over public channels since eavesdroppers would not learn anything from the node's combined private key [187], [188].…”
Section: ) System Detailsmentioning
confidence: 99%
See 2 more Smart Citations
“…An adversary could still replace un-authenticated public keys to perform a denialof-decryption attack. This attack wastes network resources and [187], [188] proposed to bind the public key of a node to its identity and their ID-based private key to counter this. Furthermore, shares of ID-based private keys are claimed to be distributable over public channels since eavesdroppers would not learn anything from the node's combined private key [187], [188].…”
Section: ) System Detailsmentioning
confidence: 99%
“…This attack wastes network resources and [187], [188] proposed to bind the public key of a node to its identity and their ID-based private key to counter this. Furthermore, shares of ID-based private keys are claimed to be distributable over public channels since eavesdroppers would not learn anything from the node's combined private key [187], [188]. However, security can be broken when an eavesdropper learns about the ID-based private key and successfully performs a key replacement attack on the same node's public key.…”
Section: ) System Detailsmentioning
confidence: 99%
See 1 more Smart Citation
“…Al-Riyam and Paterson [27] first proposed a certificateless public key cryptography (CL-PKC) that combines the advantages of IBC and PKI and overcomes the key escrow limitation of IBC. We will study on some certificateless schemes for MANETs [28], [29], [30] because certificateless-based schemes enjoy a number of features of IBC, though they are not purely identity-based.…”
Section: Identity-based Key Management Schemesmentioning
confidence: 99%
“…CL-PKC enjoys a number of features of IBC while without having the problem of key escrow. LV et al [28], [29] present a virtual private key generator (VPKG)based escrow-free certificateless public key cryptosystem for MANETs as a novel combination of certificateless and threshold cryptography. In their schemes, VPKGs collaboratively calculate the partial private key and send it to the node via public channel.…”
Section: Certificateless Schemesmentioning
confidence: 99%