Efcient Multi-Party Digital Signature using Adaptive Secret Sharing for Low-Power Devices in Wireless Networks
نویسندگان
چکیده
In this paper, we propose an efcient multi-party signature scheme for wireless networks where a given number of signees can jointly sign a document, and it can be veried by any entity who possesses the certied group public key. Our scheme is based on an efcient threshold key generation scheme which is able to defend against both static and adaptive adversaries. Specically, our key generation method employs the bit commitment technique to achieve efciency in key generation and share refreshing; our share refreshing method provides proactive protection to long-lasting secret and allows a new signee to join a signing group. We demonstrate that previous known approaches are not efcient in wireless networks, and the proposed multi-party signature scheme is exible, efcient, and achieves strong security for low-power devices in wireless networks.
منابع مشابه
Design of certification authority using secret redistribution and multicast routing in wireless mesh networks
Wireless mesh networks (WMNs) should provide authentication and key management without a trusted third party because of their self-organizing and self-configuring characteristics. Several solutions to this problem have been proposed in mobile ad hoc networks (MANETs). But they are not optimal for WMNs because WMNs are with stationary mesh routers (MRs) that do not suffer from the limited power ...
متن کاملComputation-efficient key establishment in wireless group communications
Efficient key establishment is an important problem for secure group communications. The communication and storage complexity of group key establishment problem has been studied extensively. In this paper, we propose a new group key establishment protocol whose computation complexity is significantly reduced. Instead of using classic secret sharing, the protocol only employs a linear secret sha...
متن کاملAsymptotic Close to Optimal Resource Allocation in Centralized Multi-band Wireless Networks
This paper concerns sub-channel allocation in multi-user wireless networks with a view to increasing the network throughput. It is assumed there are some sub-channels to be equally divided among active links, such that the total sum rate increases, where it is assumed each link is subject to a maximum transmit power constraint. This problem is found to be a non-convex optimization problem and i...
متن کاملSecure Multi-Party Computation over Networks
Consider a set of parties who do not trust each other but want to compute some agreed function of their inputs in a secure way. This problem is known as multi-party computation. It has various interesting applications including election over the internet, electric contracts, private and secret database, joint signatures, and others. A number of techniques for the problem have been proposed. Sec...
متن کاملBroadcast and Verifiable Secret Sharing: New Security Models and Round Optimal Constructions
Title of dissertation: BROADCAST AND VERIFIABLE SECRET SHARING: NEW SECURITY MODELS AND ROUND-OPTIMAL CONSTRUCTIONS Ranjit Kumaresan, Doctor of Philosophy, 2012 Dissertation directed by: Professor Jonathan Katz Department of Computer Science Broadcast and verifiable secret sharing (VSS) are central building blocks for secure multi-party computation. These protocols are required to be resilient ...
متن کامل