Certificateless threshold signature for data report authentication in mobile ad-hoc network

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

The focus of this paper is to design an efficient Certificateless Threshold Signature scheme (CLTHS) for data report authentication in mobile ad-hoc network, by which relatively small subsets of very large groups can report data that is aggregated and "certified" by means of a signature. Examples include vehicular networks where cars report traffic conditions, sensor networks that report aggregate data such as temperature or radiation levels, military devices transmitting information to be reported to various commands, and more. We first define the security notion for Certificateless Threshold Signature. Different from the adversarial model defined by Wang et al., our definition considers Type I and Type II adversary separately. At the same time, we develop the simulatability and relationship between certificateless threshold signature and the underlying certificateless signature. We also propose the first CLTHS scheme which is proved existentially unforgeable against adaptively chosen message attack without random oracles. Compared with the previous scheme, our scheme is much more efficient.

Original languageEnglish
Title of host publicationNSS 2009 - Network and System Security
Pages143-150
Number of pages8
DOIs
StatePublished - 2009
Externally publishedYes
Event2009 3rd International Conference on Network and System Security, NSS 2009 - Gold Coast, QLD, Australia
Duration: 19 Oct 200921 Oct 2009

Publication series

NameNSS 2009 - Network and System Security

Conference

Conference2009 3rd International Conference on Network and System Security, NSS 2009
Country/TerritoryAustralia
CityGold Coast, QLD
Period19/10/0921/10/09

Keywords

  • Certificateless threshold signature
  • Data report authentication
  • Mobile ad-hoc network

Fingerprint

Dive into the research topics of 'Certificateless threshold signature for data report authentication in mobile ad-hoc network'. Together they form a unique fingerprint.

Cite this