Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this model, the system remains secure even in the presence of a certain threshold t of corrupted/malicious nodes. In this paper, we show how to perform necessary public key operations without node-specific certificates in ad hoc networks. These operations include pair-wise key establishment, signing, and encryption. We achieve this by using Feldman’s verifiable polynomial secret sharing (VSS) as a key distribution scheme and treating the secret shares as the private keys. Unlike in the standard public key cryptography, where entities have independent private/public ke...
Identity-Based cryptography has been proposed in mobile ad-hoc networks (MANETs) to provide security...
In a threshold broadcast encryption scheme, a sender chooses (ad-hoc) a set of n receivers and a thr...
In this paper, we propose a pairing-based signcryption scheme for authenticated broadcasting, which ...
Abstract — This paper studies key management, a fundamental problem in securing mobile ad hoc networ...
13 pages.-- Printed version published on Dec 19, 2007.In this paper, we propose some cryptographic t...
Abstract- As various applications of wireless ad hoc network have been proposed, security has become...
This paper studies key management and security issues in mobile ad hoc networks (MANETs). Lack of st...
A Mobile Ad hoc Network (manet) is a wireless network that does not rely on a fixed infrastructure. ...
The characteristics of mobile ad hoc networks cause a number of challenges to security design such a...
Abstract — This paper studies public-key management, a fun-damental problem in providing security su...
Abstract—In our scheme, the master key of Mobile Ad Hoc Network (MANET) is generated by all particip...
In this thesis, we propose security solutions for pairwise and broadcast communication in mobile ad ...
In threshold cryptography, the goal is to distribute the computation of basic cryptographic primitiv...
The attractiveness of the wireless ad hoc networks lies in the fact that these networks are self-org...
Abstract—In this paper, a (t; n) threshold signature scheme is constructed without a trusted party, ...
Identity-Based cryptography has been proposed in mobile ad-hoc networks (MANETs) to provide security...
In a threshold broadcast encryption scheme, a sender chooses (ad-hoc) a set of n receivers and a thr...
In this paper, we propose a pairing-based signcryption scheme for authenticated broadcasting, which ...
Abstract — This paper studies key management, a fundamental problem in securing mobile ad hoc networ...
13 pages.-- Printed version published on Dec 19, 2007.In this paper, we propose some cryptographic t...
Abstract- As various applications of wireless ad hoc network have been proposed, security has become...
This paper studies key management and security issues in mobile ad hoc networks (MANETs). Lack of st...
A Mobile Ad hoc Network (manet) is a wireless network that does not rely on a fixed infrastructure. ...
The characteristics of mobile ad hoc networks cause a number of challenges to security design such a...
Abstract — This paper studies public-key management, a fun-damental problem in providing security su...
Abstract—In our scheme, the master key of Mobile Ad Hoc Network (MANET) is generated by all particip...
In this thesis, we propose security solutions for pairwise and broadcast communication in mobile ad ...
In threshold cryptography, the goal is to distribute the computation of basic cryptographic primitiv...
The attractiveness of the wireless ad hoc networks lies in the fact that these networks are self-org...
Abstract—In this paper, a (t; n) threshold signature scheme is constructed without a trusted party, ...
Identity-Based cryptography has been proposed in mobile ad-hoc networks (MANETs) to provide security...
In a threshold broadcast encryption scheme, a sender chooses (ad-hoc) a set of n receivers and a thr...
In this paper, we propose a pairing-based signcryption scheme for authenticated broadcasting, which ...