A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks
[chapter]
2008
Lecture Notes in Computer Science
In this paper, we propose a distributed key management approach by using the recently developed concepts of certificateless public key cryptography and threshold secret sharing schemes. ...
Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management services using threshold secret sharing ...
In this paper, we propose a novel key management approach using certificateless public key cryptography (CL-PKC) [10] . ...
doi:10.1007/978-3-540-88140-7_11
fatcat:jvpq6l22mbhj7p45jfiskzmche
A Novel Approach on Certificateless Encryption Schemes
2016
International Journal of Computer Applications
The modern field of cryptography is divided into two main areas based on the basic encryption mechanism as symmetric key cryptography and Public-key cryptography. ...
But in Public-Key method, two different but mathematically related keys are useda public key and a private key. So comparatively the second method is more popular. ...
Fagen Li et al [26] , has proposed a scheme titled key management using certificateless public key cryptography in ad hoc networks. ...
doi:10.5120/ijca2016911347
fatcat:wuk6ip5jefclbfk6vdf3nvlcya
A Pairing-free Certificateless Authenticated Group Key Agreement for Mobile Ad Hoc Network
2017
DEStech Transactions on Computer Science and Engineering
The mobile Ad Hoc network is widely used in fields without communication infrastructure. ...
To meet the demand for highly secure and efficient group communication in Ad Hoc network, many contributory group key agreement protocols have been proposed. ...
Introduction Group key agreement is an effective method to secure group communication in mobile Ad Hoc network. ...
doi:10.12783/dtcse/aice-ncs2016/5686
fatcat:ullwjqm5cvaqldxed3hjrpl2li
Mobile ad-hoc network key management with certificateless cryptography
2008
2008 2nd International Conference on Signal Processing and Communication Systems
In this paper, we present an idea of adopting certificateless public key encryption (CL-PKE) schemes over mobile ad hoc network (MANET), which has not been explored before. ...
Abstract In this paper, we present an idea of adopting certificateless public key encryption (CL-PKE) schemes over mobile ad hoc network (MANET), which has not been explored before. ...
Mobile Ad Hoc Network MANET Overview Mobile Ad-hoc Network (MANET) is one of the most widely discussed and researched areas in the field of wireless communications. ...
doi:10.1109/icspcs.2008.4813743
fatcat:74fkufzpsbddbknnrtgzq7jvo4
Certificateless Scheme Based NTRU Cryptosystem for Ad-Hoc UWB-IR Network
2017
International Journal of Wireless & Mobile Networks
Finally, we prove, after a deep examination of multiple Public Key Cryptography (PKC) schemes, that the certificateless one is the most suitable for Ad-Hoc UWB-IR networks characterized by nodes mobility ...
in order to secure data and communications in Ad-Hoc UWB-IR Networks. ...
PUBLIC KEY CRYPTOGRAPHY SCHEME FOR AD-HOC UWB-IR NETWORK Asymmetric Key Cryptography or Public Key Cryptography (PKC) scheme came to solve the problem of key management in Symmetric Key Cryptography (SKC ...
doi:10.5121/ijwmn.2017.9604
fatcat:2teoqm3iq5cmbb4wnhclyb73n4
A Survey on Key Management of Identity-based Schemes in Mobile Ad Hoc Networks
2013
Journal of Communications
In mobile ad hoc networks (MANETs), the research on key management of identity-based scheme is attracting more and more attention. ...
Public Key Certificates (PKCs). [6] As a powerful alternative to certificate-based PKI, identity-based cryptography (IBC) [7], [8] allows public keys to be derived from entities' known identity information ...
the constraints of ad-hoc networks. ...
doi:10.12720/jcm.8.11.768-779
fatcat:frkaotni2bfi7lcldt27oun2a4
Review of MANETS Using Distributed Public-key Cryptography
[article]
2014
arXiv
pre-print
Securing Mobile Ad-hoc Networks using Distributed Public-key Cryptography in pairing with Mobile Ad hoc Networks and various protocols are essential for secure communications in open and distributed environment ...
The study of secure distributed key agreement has great theoretical and practical significance. ...
"Identity-Based Key Management in MANETs using Public Key Cryptography." ...
arXiv:1405.0100v1
fatcat:3hs7cub5cbcethxs4kaukzcmyq
Enhancing Security for Mobile Ad hoc Networks by Using Identity Based Cryptography
2014
International Journal of Computer and Communication Engineering
This paper studies key management and security issues in mobile ad hoc networks (MANETs). ...
It is a certificateless solution which eliminates the need for public key distribution and certificates in public key management schemes. ...
In Asymmetric Key Cryptography there are two types of keys; Public Key, and Private Key. Public Key is used for encrypting, and Private Key is used for decrypting. ...
doi:10.7763/ijcce.2014.v3.289
fatcat:lx5x2lwp25a4jpux3i37wy4gqe
A Certificateless Signature Scheme for Mobile Wireless Cyber-Physical Systems
2008
2008 The 28th International Conference on Distributed Computing Systems Workshops
Many CPS applications will be implemented on computing devices using mobile ad hoc networks (MANETs). ...
In order to solve some problems in these schemes, such as the costly and complex key management problem in traditional public key cryptography and the "key escrow" problem in identity-based cryptography ...
Networks that support mobile wireless ad hoc architecture are typically called mobile ad hoc networks (MANETs). ...
doi:10.1109/icdcs.workshops.2008.84
dblp:conf/icdcsw/XuLZHDS08
fatcat:syeksgwz65hlpg2ina3to6julm
Exponentiated Multiple Message Communication using Certificateless Signcryption for Mobile Network Security
2017
International Journal of Computer Applications
rate compared to the state-of-the-art works. between secret and public key accordingly, if the secret and public keys are similar, the signature is valid or else the signature is invalid. ...
The mobile network consists of 500 nodes in the network structure and uses the Random Way Point (RWM) model. ...
In [15] , the various approaches were used in cryptography for Network security purpose but the key management and optimal cryptography algorithm was remained unaddressed. ...
doi:10.5120/ijca2017915705
fatcat:4eqe6i6c7jcknas6d3wpimcvpa
Insecurity of a Certificate-free Ad Hoc Anonymous Authentication
2016
International Journal of Network Security
Certificateless cryptography is introduced for eliminating the use of certificates in Public Key Infrastructure and solving the key-escrow problem in ID-based cryptogratography. ...
Recently, Qin et al. proposed the first RSA-based certificateless ring signature scheme which was proved unforgeable in random oracle model. ...
Certificateless ring signature schemes can provide anonymous authentication for ad hoc networks. ...
dblp:journals/ijnsec/XuHTZ16
fatcat:lxvutwyk2rg3loihv676vqkueq
Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges
2020
Complexity
Our contribution in this paper is to summarize the state-of-the-art key management schemes and techniques in different scenarios, such as mobile ad hoc networks, wireless sensor networks, and the Internet ...
The key management life cycle consists of initialization, key generation, key registration, key backup, key update, key recovery, and key revocation. ...
Certificateless key management schemes are key management approaches that use certificateless public key cryptography (CLPKC) [22] , while for imposing limitations and constraints on the key generation ...
doi:10.1155/2020/6619498
fatcat:vecyrbypdjcjtca5x7bumoqbvi
Tree-Based Revocation for Certificateless Authentication in Vehicular Ad-Hoc Networks
2014
Journal of Computer and Communications
This work proposes authentication based on identity as a way to increase the efficiency and security of communications in vehicular ad-hoc networks. ...
When using identity-based cryptography to achieve certificateless authentication, membership revocation is not a trivial problem. ...
Vehicular Ad-hoc NETworks (VANETs) are self-organizing networks built up from moving vehicles that communicate with each other mainly to prevent adverse circumstances on the roads, but also to achieve ...
doi:10.4236/jcc.2014.29003
fatcat:ywogib6avfhntaocyjqvcfmpmi
CPAAS: an efficient conditional privacy-preservation anonymous authentication scheme using signcryption in VANET
2021
International Journal of Vehicle Information and Communication Systems
Vehicular Ad-Hoc Network (VANET) is a tremendously promising innovation in the field of Intelligent Transportation System (ITS). ...
We have used distributed pseudo_id for preserving the privacy of vehicle and the ID-based Certificateless Signcryption scheme based on elliptic curve cryptography to provide an effective way to achieve ...
Introduction Vehicular Ad-Hoc Networks (VANETs) is an embryonic innovation that integrates ad-hoc networks and wireless LAN (WLAN), for enhancing road security and driving conditions through inter-vehicle ...
doi:10.1504/ijvics.2021.113485
fatcat:yv72cucotfcwpikmw2xhno52dq
An Optimal Lightweight Cryptographic Approach for WSN and its Energy Consumption Analysis
2018
International Journal of Intelligent Engineering and Systems
Therefore, we are focusing on evaluation and optimization of power consumption in wireless sensor networks using light weight cryptographic techniques. ...
This research paper studies the certificateless cryptographic algorithms and hence develops an optimal algorithm for the same. ...
Cryptography and security in WSN and other ad-hoc network has been increased. ...
doi:10.22266/ijies2018.0630.07
fatcat:2bxcczai4re3jie7sjt4fkcjj4
« Previous
Showing results 1 — 15 out of 238 results