Font Size: a A A

Research On The Fast Scheme Of Threshold Signature For Distributed Certificate In Wireless Ad Hoc Network

Posted on:2012-11-22Degree:MasterType:Thesis
Country:ChinaCandidate:H Y WangFull Text:PDF
GTID:2178330332487854Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Wireless Ad hoc network is a multi-hop temporary autonomous system, which consists of a group of mobile terminals with wireless transmitters and receivers. Different from traditional wireless network,Wireless Ad hoc network does not rely on any infrastructure and has no central node , it maintains the network connection by the mutual cooperation of all mobile nodes. One of the main challenges to design and implement a Wireless Ad hoc network is that it is vulnerable to security threats, such as eavesdropping, forgery, denial of service, etc.In wireless Ad hoc network, The Public Key Infrastructure(PKI) has been considered as one of the most effective way to priovide security services.It distributed the system signing key over n Certification Authority(CA) nodes of the network by (t,n) threshold secret sharing scheme,each CA node holds a share of the key, we call it partial key or sub-key. Registration Authority(RA) accepted the request of the user, and apply for the certificate signature or revoke the certificate for the user. In order to prevent the process of certificate signature of being forged and tampered, the secure and reliable threshold signature scheme should be proposed. In addition, because of Wireless Ad hoc network's narrow bandwidth and limited resources, in order to sign the distributed certificate rapidly, a threshold signature scheme is proposed, with the short key, high computation speed and less communication traffics.The main contributions of this paper are summarized as follows:1. The basic concepts of the wireless Ad hoc networks and threshold signature technology are introduced, Moreover, a comprehensive analysis of several more classic threshold signature scheme is made, then we pointed out their advantages and disadvantages.2. Two Non-interactive ECC verifiable threshold signature scheme are proposed based on the elliptic curve public cryptosystem, using the secret sharing scheme in wireless Ad hoc networks. These schemes cancel the process of interative broadcasting or sending the parameter of partial signature, and they also shows advantages in its short key design, fast computation speed, and less communication traffics.3. The system of wireless Ad hoc networks distributed certificate signature using the Non-interactive ECC verifiable threshold signature scheme II is designed and implemented.
Keywords/Search Tags:Wireless Ad hoc network, Secret Sharing, Digital Signature, Threshold Signature, Distributed Certificate
PDF Full Text Request
Related items