Abstract
The participating wireless mobile node that mobile ad hoc network (MANET) communications need to forward may be malicious. That means not only adversary might be able to acquire some sensitive information of the threshold signatures from the compromised node, but also the partial signatures may be fabricated by malicious node, the advantages of threshold signatures would disappear. Signing and encrypting the sensitive information of the threshold signatures, and only the specified receiver can recover it, which will improve the confidentiality of threshold signatures. The security analysis shows the method is suitable for the secure characteristic of MANET that has the malicious nodes, and the message transmission is secure can against the attack.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
References
Johnson D B. Routing in Ad Hoc Networks of Mobile Hosts [C]//Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications. Santa Cruz: IEEE Press, 1994: 158–163.
Zhou L, Haas Z J. Securing Ad Hoc network[J].IEEE Network, 1999,13(6): 24–30.
Kong J, Zerfos P, Luo H,et al. Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks [C]//Proceedings of IEEE ICNP. Osaka: IEEE Press, 2000: 251–260.
Hubaux J P, Buttyan L, Capkun S. Self-Organized Public-Key Management for Mobile Ad hoc Networks[J].IEEE Transactions on Mobile Computing, 2003,2(1): 52–64.
Deng HongMei, Li Wei, Agrawal D P. Routing Security in Wireless Ad Hoc Networks[J].IEEE Communications, 2002,40(10): 70–75.
Nyberg K, Ruppel A R. Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem[C]//Proceedings of Eurocrypt' 94. Berlin: Springer-Verlag, 1995: 182–193.
Yvo Desmedt. Threshold Cryptography[C]//Proceedings of Auscrypt' 92. Berlin: Springer-Verlag, 1993: 3–14.
Boney D, DeMillo R A, Lipton R J. On the Importance for Checking Cryptographic Protocols of Faults[C]//Proceedings of Eurocrypt'97. Berlin: Springer-Verlag, 1997:37–51.
Miller V S. Use of Elliptic Curve in Cryptography [C]//Proceedings of CRYPTO' 85. Berlin: Springer-Verlag, 1986: 417–426.
Corp C. The Elliptic Curve Cryptosystem [EB/OL]. [2006-01-30].http://www.secg.org/collateral/sec1_final.pdf.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National Network and Information Secure Guarantee Sustainable Development Plan (2004 Research 1-917-C-021)
Biography: GUO Wei (1966-), male, Senior-engineer, Ph. D., research direction: network security and routing.
Rights and permissions
About this article
Cite this article
Wei, G., Zhongwei, X. Enhance confidentiality of threshold signature for MANET. Wuhan Univ. J. Nat. Sci. 11, 1533–1536 (2006). https://doi.org/10.1007/BF02831814
Received:
Issue Date:
DOI: https://doi.org/10.1007/BF02831814