Security of wireless sensor network (WSN) is a considerable challenge, because of limitation in energy, communication bandwidth and storage. ID-based cryptosystem without checking and storing certificate is a suitable way used in WSN. But key escrow is an inherent disadvantage for traditional ID-based cryptosystem, i.e., the dishonest key generation center (KGC) can forge the signature of any node and on the other hand the node can deny the signature actually signed by him/herself. To solving this problem, we propose an ID-based ring signature scheme without trusted KGC. We also present the accurate secure proof to prove that our scheme is secure against existential forgery on adaptively chosen message and ID attacks assuming the complexity of computational Diffie-Hellman (CDH) problem. Compared with other ring signature schemes, we think proposed scheme is more efficient.
The security, efficiency, transmission distance and error rate are important parameters of a quantum key distribution scheme. In this article, the former two parameters are focused on. To reach high efficiency, an unsymmetrical quantum key distribution scheme that employs Greenberger-Horne-Zeilinger (GHZ) triplet states and dense coding mechanism is proposed, in which a GHZ triplet state can be used to share two bits of classical information. The proposed scheme can be employed in a noisy or lossy quantum channel. In addition, a general approach to security analysis against general individual attacks is presented.
The efficiency of reconciliation in the continuous key distribution is the main factor which limits the ratio of secret key distribution. However, the efficiency depends on the computational complexity of the algorithm. This paper optimizes the two main aspects of the reconciliation process of the continuous key distribution: the partition of interval and the estimation of bit. We use Gaussian approximation to effectively speed up the convergence of algorithm. We design the estimation function as the estimator of the SEC (sliced error correction) algorithm. Therefore, we lower the computational complexity and simplify the core problem of the reconciliation algorithm. Thus we increase the efficiency of the reconciliation process in the continuous key distribution and then the ratio of the secret key distribution is also increased.