Threshold and identity-based key management and...

Cryptography – Key management – Key distribution

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S163000, C380S286000

Reexamination Certificate

active

08050409

ABSTRACT:
As various applications of wireless ad hoc network have been proposed, security has become one of the big research challenges and is receiving increasing attention. The present invention provides for a distributed key management and authentication approach by deploying the recently developed concepts of identity-based cryptography and threshold secret sharing. Without any assumption of pre-fixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management service, which effectively solves the problem of single point of failure in the traditional public key infrastructure (PKI)-supported system. The identity-based cryptography mechanism provided not only to provide end-to-end authenticity and confidentiality, but also saves network bandwidth and computational power of wireless nodes.

REFERENCES:
patent: 7113594 (2006-09-01), Boneh et al.
Pedersen, Torben P. et al. A Threshold Cryptosystem without a Trusted Party. 1991, Springer-Verlag Berlin Heidelberg. Advances in Cryptology—Eurocrypt '91, LNCS 547, p. 522-526.
Khalili et al. “Toward Secure Key Distribution in Truly Ad-Hoc Networks”, IEEE, 2003.
Gennaro et al. “Secure Distributed Key Generation for Discrete-Log Based Cryptosystems”, Springer-Verlag, 1999.
Boner, D., et al., “Identity-Based Encryption From the Weil Pairing”, Siam J. Comput., 2003 Society for Industrial and Applied Chemicals, pp. 586-615, vol. 32, No. 3.
Cha, J. C., et al., “An Identity-Based Signature from Gap Diffie-Hellman Groups”, PKC 2003, LNCS 2567, pp. 18-30, Springer-Verlag, Berlin, Heidelberg, Y.G. Desmedt (Ed.).
Kong, J., et al., “Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks”, Proceedings for the IEEE 9thInternational Conference on Network Protocols (ICNP'01), 2001, pp. 251-260.
Lynn, B., “Authenticated Identity-Based Encryption”, IACR ePrint, Jun. 4, 2002, pp. 1-9.
Paterson, K. G., “ID-based Signatures from Pairing on Elliptic Curves”, Cryptology ePrint Archive, Report 2002/004, http://eprint.iacr.org, pp. 1-4.
Pedersen, T.P., “A Threshold Cryptosystem without a Trusted Party” (Extended abstract), 1998, pp. 522-526, Springer-Verlag.
Shamir, A., “How to Share a Secret”, Communications of the ACM, Nov. 1979, pp. 612-613, vol. 22, No. 11.
Zhou, L., et al., “Securing Ad Hoc Networks”, IEEE Networks Special Issue on Network Security, Nov./Dec. 1999, pp. 24-30.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Threshold and identity-based key management and... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Threshold and identity-based key management and..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Threshold and identity-based key management and... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4263136

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.