Abdul Basit | University of Hyderabad (original) (raw)

Abdul Basit

Research Scholar
Address: Hyderabad, Telangana, India

less

Related Authors

Rubaiyat Islam Rafat

IJERA Journal

IJERA Journal

International Journal of Engineering Research and Applications (IJERA)

IJCST Eighth Sense Research Group

Shankar Gadhve

Neetesh  Saxena

Uploads

Papers by Abdul Basit

Research paper thumbnail of Lightweight Cryptography for Distributed PKI Based MANETS

Because of lack of infrastructure and Central Authority(CA), secure communication is a challengin... more Because of lack of infrastructure and Central Authority(CA), secure communication is a challenging job in MANETs. A lightweight security solution is needed in MANET to balance its nodes resource tightness and mobility feature. The role of CA should be decentralized in MANET because the network is managed by the nodes themselves without any fixed infrastructure and centralized authority. In this paper, we created a distributed PUblic Key Infrastructure (PKI) using Shamir secret sharing mechanism which allows the nodes of the MANET to have a share of its private key. The traditional PKI protocols require centralized authority and heavy computing power to manage public and private keys, thus making them not suitable for MANETs. To establish a secure communication for the MANET nodes, we proposed a lightweight crypto protocol which requires limited resources, making it suitable for MANETs.

Research paper thumbnail of Multi-stage Multi-secret Sharing Scheme for Hierarchical Access Structure

—Hierarchical threshold secret sharing (HTSS) schemes can be thought as a generalization of class... more —Hierarchical threshold secret sharing (HTSS) schemes can be thought as a generalization of classical threshold secret sharing schemes, and they have been extensively in the literature. In an HTSS, participants are classified into different security levels, and the threshold value of a higher level is smaller than that of a lower level. Participants in each level can recover the secrets, if the number of shares is equal to or more than the corresponding threshold value. Share of a higher level participant can be used to reconstruct the secret at lower level. In this paper, we proposed first hierarchical threshold multi-secret sharing scheme based on polynomial interpolation. Proposed scheme is a variation to HTSS schemes based on the CRT suggested by Singh et al. and Harn et al. Novelty of the proposed scheme is that each participant requires to keep only one secret share and multiple secrets can be shared separately without refreshing the secret share. Also, secrets are recovered in stage by stage. Our scheme which is unconditionally secure, is based on Lagrange interpolation polynomial and one-way function.

Research paper thumbnail of Node Authentication Using BLS Signature in Distributed PKI Based MANETS

Authenticating a node in mobile ad-hoc networks is a challenging task due to their dynamic and re... more Authenticating a node in mobile ad-hoc networks is a challenging task due to their dynamic and resource constraint infrastructure. For this purpose, MANETS adopt two kinds of approaches Public key cryptography and identity based cryptography. In Public Key Infrastructure (PKI), Certificate Authority (CA) is responsible for key management. In order to adopt it to MANET, the job of the CA must be distributed. The master secret key is shared among the nodes of the MANET, to self-organize the network without a central authority.The key is shared based on Shamir secret sharing scheme with bi-variate polynomial to make the MANET fully self-managed by nodes.In this paper, we considered PKI based scenario and proposed a new scheme to authenticate a node using BLS signature which is light weight compared to the existing schemes thus making it suitable for MANET.

Research paper thumbnail of Sequential Secret Sharing Scheme Based on Chinese Remainder Theorem

Multilevel Sequential secret sharing scheme is a composition of multilevel threshold secret shari... more Multilevel Sequential secret sharing scheme is a composition of multilevel threshold secret sharing and multistage multi-secrets sharing scheme. In this scheme, shareholders are partitioned into multiple subsets. Each subset will have multi-secrets. Shareholders in each subset could reconstruct many secrets in the consecutive stage if t or more number of shares are available. In addition, a lower level subset can use higher level subset shares to reconstruct the secret. Verification is provided to detect cheating in the proposed scheme.This scheme is unconditionally secure and it is efficient. keywords: Asmuth Bloom's sequence, Chinese remainder Theorem, Multilevel threshold secret sharing, Multi-stage multi-secret sharing scheme.

Research paper thumbnail of Lightweight Cryptography for Distributed PKI Based MANETS

Because of lack of infrastructure and Central Authority(CA), secure communication is a challengin... more Because of lack of infrastructure and Central Authority(CA), secure communication is a challenging job in MANETs. A lightweight security solution is needed in MANET to balance its nodes resource tightness and mobility feature. The role of CA should be decentralized in MANET because the network is managed by the nodes themselves without any fixed infrastructure and centralized authority. In this paper, we created a distributed PUblic Key Infrastructure (PKI) using Shamir secret sharing mechanism which allows the nodes of the MANET to have a share of its private key. The traditional PKI protocols require centralized authority and heavy computing power to manage public and private keys, thus making them not suitable for MANETs. To establish a secure communication for the MANET nodes, we proposed a lightweight crypto protocol which requires limited resources, making it suitable for MANETs.

Research paper thumbnail of Multi-stage Multi-secret Sharing Scheme for Hierarchical Access Structure

—Hierarchical threshold secret sharing (HTSS) schemes can be thought as a generalization of class... more —Hierarchical threshold secret sharing (HTSS) schemes can be thought as a generalization of classical threshold secret sharing schemes, and they have been extensively in the literature. In an HTSS, participants are classified into different security levels, and the threshold value of a higher level is smaller than that of a lower level. Participants in each level can recover the secrets, if the number of shares is equal to or more than the corresponding threshold value. Share of a higher level participant can be used to reconstruct the secret at lower level. In this paper, we proposed first hierarchical threshold multi-secret sharing scheme based on polynomial interpolation. Proposed scheme is a variation to HTSS schemes based on the CRT suggested by Singh et al. and Harn et al. Novelty of the proposed scheme is that each participant requires to keep only one secret share and multiple secrets can be shared separately without refreshing the secret share. Also, secrets are recovered in stage by stage. Our scheme which is unconditionally secure, is based on Lagrange interpolation polynomial and one-way function.

Research paper thumbnail of Node Authentication Using BLS Signature in Distributed PKI Based MANETS

Authenticating a node in mobile ad-hoc networks is a challenging task due to their dynamic and re... more Authenticating a node in mobile ad-hoc networks is a challenging task due to their dynamic and resource constraint infrastructure. For this purpose, MANETS adopt two kinds of approaches Public key cryptography and identity based cryptography. In Public Key Infrastructure (PKI), Certificate Authority (CA) is responsible for key management. In order to adopt it to MANET, the job of the CA must be distributed. The master secret key is shared among the nodes of the MANET, to self-organize the network without a central authority.The key is shared based on Shamir secret sharing scheme with bi-variate polynomial to make the MANET fully self-managed by nodes.In this paper, we considered PKI based scenario and proposed a new scheme to authenticate a node using BLS signature which is light weight compared to the existing schemes thus making it suitable for MANET.

Research paper thumbnail of Sequential Secret Sharing Scheme Based on Chinese Remainder Theorem

Multilevel Sequential secret sharing scheme is a composition of multilevel threshold secret shari... more Multilevel Sequential secret sharing scheme is a composition of multilevel threshold secret sharing and multistage multi-secrets sharing scheme. In this scheme, shareholders are partitioned into multiple subsets. Each subset will have multi-secrets. Shareholders in each subset could reconstruct many secrets in the consecutive stage if t or more number of shares are available. In addition, a lower level subset can use higher level subset shares to reconstruct the secret. Verification is provided to detect cheating in the proposed scheme.This scheme is unconditionally secure and it is efficient. keywords: Asmuth Bloom's sequence, Chinese remainder Theorem, Multilevel threshold secret sharing, Multi-stage multi-secret sharing scheme.

Log In