Visible to the public Proactive secret sharing for long lived MANETs using Elliptic Curve Cryptography

TitleProactive secret sharing for long lived MANETs using Elliptic Curve Cryptography
Publication TypeConference Paper
Year of Publication2017
AuthorsKumar, N. C., Basit, A., Singh, P., Venkaiah, V. C.
Conference Name2017 International Conference on Inventive Computing and Informatics (ICICI)
ISBN Number978-1-5386-4031-9
KeywordsAd hoc networks, bi-variate polynomial, compositionality, Elliptic curve cryptography, MANET, Metrics, mobile ad-hoc network, mobile computing, proactive, Protocols, pubcrawl, resilience, Resiliency, secret sharing technique, security, threshold cryptography
Abstract

Since MANETs are infrastructure-less, they heavily use secret sharing techniques to distribute and decentralize the role of a trusted third party, where the MANET secret s is shared among the legitimate nodes using (t, n) threshold secret sharing scheme. For long lived MANETs, the shared secret is periodically updated without changing the MANET secret based on proactive secret sharing using Elliptic Curve Cryptography(ECC). Hence, the adversary trying to learn the secret, needs to gain at-least t partial shares in the same time period. If the time period and the threshold value t are selected properly, proactive verifiable secret sharing can maintain the overall security of the information in long lived MANETs. The conventional cryptographic algorithms are heavy weight, require lot of computation power thus consuming lot of resources. In our proposal we used Elliptic Curve Cryptography to verify commitments as it requires smaller keys compared to existing proactive secret sharing techniques and makes it useful for MANETs, Which are formed of resource constraint devices.

URLhttps://ieeexplore.ieee.org/document/8365362/
DOI10.1109/ICICI.2017.8365362
Citation Keykumar_proactive_2017