Efficient Aggregate Signature Algorithm and Its Application in MANET
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32797
Efficient Aggregate Signature Algorithm and Its Application in MANET

Authors: Daxing Wang, Jikai Teng

Abstract:

An aggregate signature scheme can aggregate n signatures on n distinct messages from n distinct signers into a single signature. Thus, n verification equations can be reduced to one. So the aggregate signature adapts to Mobile Ad hoc Network (MANET). In this paper, we propose an efficient ID-based aggregate signature scheme with constant pairing computations. Compared with the existing ID-based aggregate signature scheme, this scheme greatly improves the efficiency of signature communication and verification. In addition, in this work, we apply our ID-based aggregate sig- nature to authenticated routing protocol to present a secure routing scheme. Our scheme not only provides sound authentication and a secure routing protocol in ad hoc networks, but also meets the nature of MANET.

Keywords: Identity-based cryptography, Aggregate signature, Bilinear pairings, Authenticated routing scheme.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1336488

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2057

References:


[1] Ladislav Huraj, Vladimir Siladi, Jarmila Skrinarova, and Veronika Bojdova, Towards a VO Intersection Trust Model for Ad hoc Grid Environment: Design and Simulation Results, IAENG International Journal of Computer Science, 40:2, pp.53-61, 2013.
[2] C. Perkins, E. Belding-Royer, and S. Das. Ad hoc on-demand distance vector (AODV) routing, 2003. IETF RFC 3561.W.-K. Chen, Linear Networks and Systems (Book style). Belmont, CA: Wadsworth, pp. 123–135, 1993.
[3] Y. Hu, D. Johnson, and A. Perrig. SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks, pp.175-192, 2003.
[4] C. Perkins and P. Bhagwat. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In Proceedings of the SIGCOMM Conference on Communications Architectures, Protocols and Applications, pp. 234-244, 2003.
[5] Y. Hu, A. Perrig, and D. B. Johnson. Ariadne: a secure on-demand routing protocol for ad hoc networks. In Proceedings of the 8th Annual International Conference on Mobile Computing and Networking, pp. 12-23, New York, NY, USA, 2002. ACM Press.
[6] M.G. Zapata and N. Asokan. Securing ad hoc routing protocols. In Proceedings of ACM Workshop on Wireless Security (WiSe), pp. 1-10, 2002.
[7] K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer. A secure routing protocol for ad hoc networks. In Proceedings of the 10th IEEE International Conference on Network Protocols, pp. 78-87, 2002.
[8] D. Boneh, C. Gentry, B. Lynn, Aggregate and verifiably encrypted signatures from bilinear maps. Proceedings of Advances in Cryptology Eurocrypt’2003, Warsaw, pp.416–432.
[9] Bellare, M., Namprempre, C., Neven, G., Security proofs for identity based identification and signature schemes. In: Advances in Cryptology: Eurocrypt’04, LNCS 3027. Springer-Verlag, pp.268–286, 2004.
[10] Galindo, D., Herranz, J., Kiltz, E., On the generic construction of identity-based signatures with additional properties. In: Advances in Cryptology: Asiacrypt’06, LNCS 4284. Springer-Verlag, pp.179–193, 2006.
[11] Xu, J., Zhang, Z., Feng, D., ID-based aggregate signatures from bilinear pairings. In: CANS’06, LNCS 3810. Springer-Verlag, pp.110–119, 2006.
[12] Yoon, H.J., Cheon, J.H., Kim, Y., Batch verification with ID-based signatures. In: ICISC’08, LNCS 3506. Springer-Verlag, pp.233–248, 2008.
[13] Herranz, J., Deterministic identity-based signatures for partial aggre- gation. The Computer Journal, 49 (3), pp.322–330, 2011.
[14] Gentry C, Ramzan Z. Identity-based aggregate signatures , PKC 2006: 9th International Conference on Theory and Practice of Public Key Cryptography, LNCS. Berlin: Springer-Verlag, pp.257–273, 2006.
[15] Bellare M, Namprempre C, Neven G., Unrestricted aggregate sig- natures, Proceedings of ICALP 2007, LNCS 4596, Springer Verlag, pp.411-422, 2007.
[16] Yifei Zhang and Hongli Zhang, An Experience-Based Algorithm for Securing Network Coordinate Systems, ICIC Express Letters, Part B: Applications, vol.2, Issue 4, pp.995-1002, 2011.
[17] Li Yifan, Chen Huiyan, Application of Id-Based Aggregate Signature in MANETs, Journal Of Electronics, Vol.27 No.4, pp.516-521, 2012.