Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks

نویسندگان

  • Goichiro Hanaoka
  • Tsuyoshi Nishioka
  • Yuliang Zheng
  • Hideki Imai
چکیده

E cient ID based key sharing schemes are desired world widely for secure communica tions on Internet and other networks The Key Predistiribution Systems KPS are a large class of such key sharing schemes The remarkable property of KPS is that in order to share the key a participant should only input its partner s identi er to its secret KPS algorithm Although it has a lot of advantages in terms of e ciency to achieve unconditional security a large amount of memory is required While conventional KPS establishes communication links between any pair of entities in a communication system in many practical commu nication systems such as broadcasting not all links are required In this article we show the optimal method to remove these unnecessary communication links In our scheme the required memory for each entity is just proportional to the number of its partners while that in conventional KPS is proportional to the number of entities in the whole system As ex ample if an entity communicates only with r of others the required memory is reduced to be r of that of conventional KPS Furthermore this memory size is proven to be optimal Our scheme provides a more e cient way for secure communication especially in large scale networks

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimal Unconditionally Secure ID-Based Key Distribution Scheme for Large-Scaled Networks∗

Efficient ID-based key sharing schemes are desired worldwide in order to obtain secure communications on the Internet and other related networks, and Key Pre-distribution System (KPS) is one of the majority of such key sharing schemes. The remarkable property of KPS, is that, user need only input the partner’s identifier to the secret KPS-algorithm in order to share a key between them. Although...

متن کامل

LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

متن کامل

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

متن کامل

An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks

An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...

متن کامل

An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks

Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999