present. We suggest using the scheme described by
Arboit, G. et al., (2008) where the certificate
revocation scheme requires that participants of the
system monitor the behavior of the other nodes.
4 PARTICIPANT
ADDITION-REMOVAL
One of the important benefits of the proposed
certification scheme is its ability to easily add and
remove Participants in the group U. To achieve that,
we adopt the participant addition-deletion
mechanism proposed by Noack and Spitz (2009).
We assume that the certification scheme has been
already established, that every participant has his
local public-private key pair, his partial public key
pair as well as his legitimate certificate and that he
has contributed successfully to the generation of the
global public-private key pair of the distributed CA.
We employ the share renewal technique of
Noack and Spitz (2009), based on the PSS scheme
of Herzberg, A. et al., (1995). PSS updates already
distributed shares of all n members to provide
proactive security. While adding a participant, +1
members of U, forming a subset U
splt
, split off a part
of their secret and share this part with the new
member. Removing a participant is done by
computing and redistributing the participant's secret
to some remaining U members.
4.1 Addition-Removal Certificate
Management
Addition - Removal of Participants has no effect in
the global public key of the distributed certification
scheme. So, certificates remain valid even after the
partial public-private key pairs change values and
can still be issued or verified. This happens due to
the fact that the local public private key pairs that
handle secure communication between participants
are different in principle from the partial public –
private key pairs. Local key pairs are only changing
in a certificate reissuing operation after a participant
addition –removal. In that case, the reissuing
certificate procedure is different than the one
described in 3. In certificate reissuing after
participant addition –removal, the partial key pair
replaces the local key pair of a requesting participant
and subsection 2.2, 2.3 processes are executed.
5 CONCLUSIONS
In this paper, an ECC based fully distributed
Threshold cryptography certification scheme was
proposed that eliminates the need for trusted dealer
for secret sharing. The certification infrastructure is
self-organized and fully decentralized. Also, using
the mechanism described by Noack and Spitz
(2009), addition and removal of participants is
achieved while keeping the global public key
unchanged..
ACKNOWLEDGEMENTS
The reported work is supported through the
SECRICOM FP7 FP7 SEC 218123European project
REFERENCES
Shamir, A. auth., 1979. How to share a secret.
Communications of the ACM, 22, σ.612–613.
Desmedt, Y& Frankel Y., 1989: Threshold Cryptosystems.
CRYPTO 1989:307-315
Frankel, Y. et al. auth., 1997. Optimal-resilience proactive
public-key cryptosystems. Proceedings of the 38th
Annual Symposium on Foundations of Computer
Science, pp.384–.
Pedersen, 1991: A Threshold cryptosystem without a
trusted third party, proc. of EuroCrypt 91, Springer
Verlag LNCS nr. 547.
Shoup, V. auth., Practical threshold signatures. , 1807
pages, pp.207-220.
Damgård, I. & Koprowski, M. auth., 2000. Practical
Threshold RSA Signatures Without a Trusted Dealer. ,
pp.152-165.
Andreas Noack, Stefan Spitz, 2009, Dynamic Threshold
Cryptosystem without Group Manager Network
Protocols and Algorithms 1: 1. pp 108-121
Crépeau, C. & Davis, C. R. auth., 2003. A certificate
revocation scheme for wireless ad hoc networks. in
Proceedings of the 1st ACM workshop on Security of
ad hoc and sensor networks. SASN ’03. New York,
NY, USA: ACM, pp 54–61.
Arboit, G. et al. auth., 2008. A localized certificate
revocation scheme for mobile ad hoc networks. Ad
Hoc Networks, 6, pp.17–31.
Kyul Park et al. auth., 2010. Certificate Revocation to
Cope with False Accusations in Mobile Ad Hoc
Networks. in Vehicular Technology Conference (VTC
2010-Spring), 2010 IEEE 71st. Vehicular Technology
Conference (VTC 2010-Spring),. pp 1-5.
Herzberg, A. et al. et al., 1995. Proactive Secret Sharing
Or: How to Cope With Perpetual Leakage. Lecture
Notes in Computer Science, 963:339, pp.339--352.
SECRYPT 2011 - International Conference on Security and Cryptography
404