Open Access Open Access  Restricted Access Subscription or Fee Access

Verifiable Secret Sharing protocol for Mobile Ad-hoc Networks

P.V. Siva Kumar, Dr. Rajasekhara Rao Kurra, Appala Naidu Tentu

Abstract


Security is the main issue for Mobile Ad-hoc Networks MANETs). Due to unreliable wireless media, host mobility providing secure communications is a challenge. One of the important issues when applying cryptography to MANETs is how to allocate the role of the trusted authority between the nodes. Threshold cryptography provides the way to convey a shared key to a node without the aid of key infrastructure and is suitable for a secret key sharing in a MANETs. Generally, in order to have a secure communication between two (or more) parties, a secure association must be established by sharing a secret. In this paper, we propose a verifiable multi-secret sharing protocol based on an identity based signature scheme, which uses identities of the node’s available in the network. This scheme uses advantages of an identity based signature scheme and hash function for the verifiability, which we do not require much computation. It checks either dealer or participant’s honest, means dealer may distribute a fake share to a certain participant or a corrupted participant may provide a fake share to other participants in reconstruction. In previous proposed schemes [6],[13],[19], they have used one-way function, RSA, Discrete logarithm functions to keep share information in public. Their idea was choosing above mentioned functions is mostly for the purpose of verification of shares. In our scheme, we did not use any exponentiation functions, but we have used two variable one-way function for the purpose of share calculation not for the verification. Our scheme resists dealer and participants cheating behavior efficiently.


Keywords


Secret Sharing, Multi Secret Sharing, Verifiable, Threshold Scheme, Hash Function, MANETs

Full Text:

PDF

References


F. Anjum and P. Mouchtaris, Security for wireless ad hoc networks. Wiley-Blackwell, Mar. 2007.

Blakley, G. R., Safeguarding cryptographic keys. In: AFIPS conference proceedings, vol. 48, 313 - 317, 1979.

J. He, E. Dawson, Multistage secret sharing based on one-way function, Electronics Letters 30 (19) (1994) 15911592.

J. He, E. Dawson, Multi secret-sharing scheme based on one-way function, Electronics Letters 31 (2) (1995) 9395.

R.-J. Hwang, C.-C. Chang, An on-line secret sharing scheme for multi secrets, Computer Communications 21 (13) (1998) 11701176.

M.H. Dehkordi, S. Mashhadi An efficient threshold verifiable multi-secret sharing, Computer Standards and Interfaces, 30 (2008), pp. 187190.

G Polymerou, EA Panaousis, E Pfluegel, C Politis, A novel lightweight multi-secret sharing technique for mobile ad-hoc networks, 29th Wireless World Research Forum (WWRF), Berlin, Germany, 2012.

C.W. Chan and C.C. Chang, A Scheme for Threshold Multi secret Sharing, Applied Mathematics and Computation, Vol. 166, No.1, pp. 1-14, 2005

Chien, H. Y., Jan, J. K., and Tseng, Y. M., “A practical (t,n) multisecret sharing scheme”, IEICE Trans. fundamentals E83-A (12), 2000,pp. 2762-2765.

R.-J. Hwang, C.-C. Chang, An on-line secret sharing scheme for multi secrets, Computer Communications 21 (13) (1998) 11701176.

A. Menezes, P. Oorschot and S. Vanstone, Handbook of applied cryptography, CRC Press, 1996

M. Stadler, Publicly verifiable secret sharing, Advances in Cryptology, EUROCRYPT-96, Lecture Notes in Computer Science, vol.1070, Springer-Verlag, 1996, pp.190-199.

J. Shao, Z.-F. Cao, A new efficient (t,n) verifiable multi-secret sharing (VMSS) based on Y.C.H scheme, Applied Mathematics and Computation 168 (2005) 135140.

Shamir A. Identity Based Cryptosystems and Signature Schemes. In: CRYPTO 1984, LNCS 196, pp. 47-53, Springer, Verlag 1984.

Shamir, A. 1979. How to share a secret. Comm. ACM 22, 612-613.

C.-C. Yang, T.-Y. Chang, M.-S. Hwang, A (t,n) multi-secret sharing scheme, Applied Mathematics and Computation, 151 (2004) 483490.

V. Daza, J. Herranz, P. Morillo, and C. Rafols, Cryptographic techniques for mobile ad-hoc networks, Computer Networks, Elsevier,vol. 51, no. 18 , pp. 4938-4950, 2007.

H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, Security in mobile ad hoc networks: challenges and solutions, IEEE Wireless Communications,vol. 11, no. 1, pp. 3847, Feb. 2004.

J. Zhao, J. Zhang, R. Zhao, A practical verifiable multi-secret sharing scheme, Computer Standards and Interfaces 29 (1) (2007) 138141.

L. Zhou and Z. Haas, Securing ad hoc networks, IEEE Network, vol.13, no. 6, pp. 2430, Nov./Dec. 1999.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.