{"title":"构建移动自组织网络中的主动秘密共享","authors":"H. Asaeda, M. Rahma, Y. Toyama","doi":"10.1109/ISWPC.2006.1613620","DOIUrl":null,"url":null,"abstract":"Threshold cryptography is a novel cryptographic technique sharing secret among members. It divides a secret key into multiple shares by a cryptographic operation. This technique is useful to provide a shared secret key to legitimate nodes in a infrastructure-less mobile ad-hoc network (MANET). As an additional component, proactive secret sharing (PSS) allows a set of nodes holding shares to refresh all shares by generating a new set of shares for the same secret key from the old shares without reconstructing the secret key. It is necessary to reasonably escape from threats of exposing the secret key when threshold cryptography is used. In this paper, we design the PSS protocol implementation specification in a MANET environment. In our scheme all share holder nodes synchronize the PSS procedure in a well-managed fashion to keep the protocol consistency. We then introduce our actual implementation and evaluate the behavior and its performance criteria.","PeriodicalId":145728,"journal":{"name":"2006 1st International Symposium on Wireless Pervasive Computing","volume":"55 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Structuring proactive secret sharing in mobile ad-hoc networks\",\"authors\":\"H. Asaeda, M. Rahma, Y. Toyama\",\"doi\":\"10.1109/ISWPC.2006.1613620\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Threshold cryptography is a novel cryptographic technique sharing secret among members. It divides a secret key into multiple shares by a cryptographic operation. This technique is useful to provide a shared secret key to legitimate nodes in a infrastructure-less mobile ad-hoc network (MANET). As an additional component, proactive secret sharing (PSS) allows a set of nodes holding shares to refresh all shares by generating a new set of shares for the same secret key from the old shares without reconstructing the secret key. It is necessary to reasonably escape from threats of exposing the secret key when threshold cryptography is used. In this paper, we design the PSS protocol implementation specification in a MANET environment. In our scheme all share holder nodes synchronize the PSS procedure in a well-managed fashion to keep the protocol consistency. We then introduce our actual implementation and evaluate the behavior and its performance criteria.\",\"PeriodicalId\":145728,\"journal\":{\"name\":\"2006 1st International Symposium on Wireless Pervasive Computing\",\"volume\":\"55 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-04-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2006 1st International Symposium on Wireless Pervasive Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISWPC.2006.1613620\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 1st International Symposium on Wireless Pervasive Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISWPC.2006.1613620","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Structuring proactive secret sharing in mobile ad-hoc networks
Threshold cryptography is a novel cryptographic technique sharing secret among members. It divides a secret key into multiple shares by a cryptographic operation. This technique is useful to provide a shared secret key to legitimate nodes in a infrastructure-less mobile ad-hoc network (MANET). As an additional component, proactive secret sharing (PSS) allows a set of nodes holding shares to refresh all shares by generating a new set of shares for the same secret key from the old shares without reconstructing the secret key. It is necessary to reasonably escape from threats of exposing the secret key when threshold cryptography is used. In this paper, we design the PSS protocol implementation specification in a MANET environment. In our scheme all share holder nodes synchronize the PSS procedure in a well-managed fashion to keep the protocol consistency. We then introduce our actual implementation and evaluate the behavior and its performance criteria.