Filters








1,714 Hits in 4.7 sec

Threshold RSA for Dynamic and Ad-Hoc Groups [chapter]

Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin
Advances in Cryptology – EUROCRYPT 2008  
We consider the use of threshold signatures in ad-hoc and dynamic groups such as MANETs ("mobile ad-hoc networks").  ...  The resultant schemes provide the efficiency and flexibility needed in ad-hoc groups, and add the capability of incorporating new members (share-holders) to the group of potential signers without relying  ...  We are grateful to Stas Jarecki and the anonymous Eurocrypt reviewers for their helpful comments.  ... 
doi:10.1007/978-3-540-78967-3_6 dblp:conf/eurocrypt/GennaroHKR08 fatcat:6oecgu2kwzblng22an2c7fc2ky

Ad hoc key management infrastructure

B. Lehane, L. Dolye, D. O'Mahony
2005 International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II  
Key Management Infrastructure in an ad hoc network needs to be formed in an ad hoc manner.  ...  A further application to group keying with distributed group membership management is also discussed.  ...  Because of the potentially highly dynamic nature of groups in ad hoc networks, it is preferable to have such a distributed scheme that allows a rapid response time to group changes.  ... 
doi:10.1109/itcc.2005.57 dblp:conf/itcc/LehaneDO05 fatcat:c5kefjynazf5djwaih5upheoda

Dynamic Threshold Cryptosystem without Group Manager

Andreas Noack, Stefan Spitz
2009 Network Protocols and Algorithms  
Dynamic threshold cryptosystems are best suited to realize distributed signatures in dynamic (e.g. ad-hoc) networks.  ...  In dynamic networks with flexible memberships, group signatures and distributed signatures are an important problem.  ...  This is an important feature for dynamic groups, since it is very common, e.g. in ad-hoc networks that members leave a group. Gennaro et al. used RSA and bi-variate polynomials for their scheme.  ... 
doi:10.5296/npa.v1i1.161 fatcat:54ynpm4gunc7rdilizuzkc3tse

Efficient and Adaptive Threshold Signatures for Ad hoc networks

Roberto Di Pietro, Luigi Vincenzo Mancini, Giorgio Zanin
2007 Electronical Notes in Theoretical Computer Science  
In this paper, we propose a secure, flexible, robust and fully distributed signature service, for ad hoc groups.  ...  of threat the ad hoc group is subject to, and availability.  ...  Other works [19, 20, 13] propose solutions based on threshold signatures for ad hoc and peer-to-peer environments, however they do not address the problem of increasing the threshold.  ... 
doi:10.1016/j.entcs.2006.11.012 fatcat:3dos5dw6yvgibonlko6knkpd2i

AUTHENTICATION ARCHITECTURE USING THRESHOLD CRYPTOGRAPHY IN KERBEROS FOR MOBILE AD HOC NETWORKS

Hadj Gharib, Kamel Belloulata
2014 Advances in Science and Technology Research Journal  
Due to their dynamically changing topology and open environment without a centralized policy control of a traditional network, a mobile ad hoc network (MANET) is vulnerable to the presence of malicious  ...  In this paper we propose a new key management scheme based on threshold cryptography in kerberos for MANET's, the proposed scheme uses the elliptic curve cryptography method that consumes fewer resources  ...  Zhou et al. in [4] proposed the use of threshold cryptography for providing security to Ad-Hoc networks and enumerate challenges in the design of such a scheme.  ... 
doi:10.12913/22998624.1105141 doaj:33c091d6baa84f63ae47a9069b2763ed fatcat:zlxfauplorbkpbyehxo63avpg4

Providing robust and ubiquitous security support for mobile ad-hoc networks

Jiej, Z. Petros, Haiyun Luo, Songwu Lu, Lixia Zhang
2001 Proceedings Ninth International Conference on Network Protocols ICNP 2001 ICNP-01  
Providing security support for mobile ad-hoc networks is challenging for several reasons: (a) wireless networks are susceptible to attacks ranging from passive eavesdropping to active interfering, occasional  ...  In our design, we distribute the certification authority functions through a threshold secret sharing mechanism, in which each entity holds a secret share and multiple entities in a local neighborhood  ...  Threshold secret sharing exhibits several desirable properties that fit well in ad-hoc networks: (a) A key feature of ad-hoc networks is lack of centralized control.  ... 
doi:10.1109/icnp.2001.992905 dblp:conf/icnp/KongZLLZ01 fatcat:uvj4ir4irzaznmlm2ipwtnk76y

Threshold cryptography in P2P and MANETs: The case of access control

Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
2007 Computer Networks  
Decentralized access control is the fundamental security service for ad hoc groups.  ...  In this paper, we construct several distributed access control mechanisms for ad hoc groups.  ...  However, they are inflexible and ultimately unsuitable for dynamic ad hoc networks.  ... 
doi:10.1016/j.comnet.2007.03.001 fatcat:fxrfhfrmbndannbemz5ju24u2e

Completely self-organization Ad hoc networks key management scheme based on elliptic curve

Shouyun Song, Junpeng Xu, Shuai Yang, Qing Cong
2010 2010 3rd International Conference on Computer Science and Information Technology  
Computational cost of this program has a small computation safe, reliability and good scalability for large-scale Ad hoc network.  ...  Ad hoc key management in this paper.  ...  As Ad hoc wireless networks' features, and it are vulnerable to server denial attacks [2, 3, 4] , Traditional network of key management scheme usually uses RSA public key algorithm threshold scheme  ... 
doi:10.1109/iccsit.2010.5564751 fatcat:lxteds6cevcidkc6qs2ivq3wdi

Admission control in Peer-to-Peer

Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
2003 Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks - SASN '03  
Among other things, our experimental results demonstrate that, unfortunately, advanced cryptographic constructs (such as verifiable threshold signatures) are not yet ready for prime time.  ...  This paper builds upon some recent work [11] which constructed a peer group admission control framework based on different policies and corresponding cryptographic techniques.  ...  For large groups and especially for dynamic thresholds, the GMC will become huge for the PS schemes.  ... 
doi:10.1145/986858.986873 dblp:conf/sasn/SaxenaTY03 fatcat:rdbcdmq4snaufo6nlygldowkrq

An Approach for Secure Mobile Ad Hoc Networks: Key Management and Routing
ENGLISH

Hridya V Deva raj, Jinu Mohan
2016 International Journal of Innovative Research in Computer and Communication Engineering  
Because of this infrastructure less environment, limited power and dynamic topology, it becomes very difficult to provide a secure environment in MANET.  ...  Reason for this increased attention is the wide range of multimedia applications running in the infrastructure less environment.  ...  However, group key management for large and dynamic groups in MANETs is a difficult problem because of the requirement of scalability and security.Thus this phase proposes a reliable dynamic clustering  ... 
doi:10.15680/ijircce.2016.0407007 fatcat:oegnbkbsanembbh2mxov5gm2v4

Threshold Ring Signatures and Applications to Ad-hoc Groups [chapter]

Emmanuel Bresson, Jacques Stern, Michael Szydlo
2002 Lecture Notes in Computer Science  
Then we provide extensions to make ring signatures suitable in practical situations, such as threshold schemes or ad-hoc groups.  ...  Finally we propose an efficient scheme for threshold scenarios based on a combinatorial method and provably secure in the random oracle model.  ...  The authors thank Moni Naor and Berry Schoenmakers for helpful discussions and the anonymous referees for many extensive, detailed comments.  ... 
doi:10.1007/3-540-45708-9_30 fatcat:mdwfd6mrjraffijzyqlurvzrcq

Secure Group Communication with Dynamic Membership Change in Ad Hoc Networks

Heeyoul Kim
2011 KSII Transactions on Internet and Information Systems  
In this paper we present a scalable model that supports communication-efficient membership change in ad hoc networks by exclusionary keys and RSA functions.  ...  Due to the ad hoc nature the scalability on dynamic membership change is a major concern.  ...  secure group communication model for ad hoc networks.  ... 
doi:10.3837/tiis.2011.09.010 fatcat:skcwvaxm2rgzffj6x6x7mtbiqi

A STUDY ON THE EXISTING THRESHOLD CRYPTOGRAPHY TECHNIQUES

Prabha Elizabeth Varghese, Department Of Computer Science School of Engineering, CUSAT Kerala, India
2020 International Journal of Advanced Research in Computer Science  
Encryption is done using a public key and the participating parties possess the corresponding private key. Thus for asymmetric key cryptography, threshold versions of encryptions can be built.  ...  In this paper we explore the various extensions and techniques of threshold cryptography.  ...  Composite Trust Based Threshold cryptography Key Management for Mobile Ad hoc Network -Minimizes communication overhead incurred by the key management operations.  ... 
doi:10.26483/ijarcs.v11i5.6659 fatcat:fpzqcdilmzd73afwyb32frymku

SECURE ROUTING IN MANET USING HYBRID CRYPTOGRAPHY

D. Sivamurugan, L. Raja
2017 International journal of research - granthaalayah  
Mobile ad hoc network (MANET) is a group of mobile nodes that communicates with each other without any supporting infrastructure.  ...  A common threshold value is set for each node and by using this threshold value, every node in the network can be identified as either a malicious node or a regular node.  ...  Introduction Mobile Ad-hoc network is a set of wireless devices called wireless nodes, which dynamically connect and transfer information.  ... 
doi:10.29121/granthaalayah.v5.i4.2017.1798 fatcat:3y36ffcluvejxapsvk3vmxy4im

Fully distributed certificate authority based on polynomial over elliptic curve for MANET

Ahmad Alomari
2014 International Journal of Networked and Distributed Computing (IJNDC)  
A mobile ad hoc network (MANET) is a wireless communication network, which does not rely on any centralized management or a pre-existing infrastructure.  ...  The main advantage of ECC versus RSA is that for the same level of security it requires a much sorter key length.  ...  IETF's MANET working group has identified OLSR as one of the four base routing protocols for use in ad hoc networks.  ... 
doi:10.2991/ijndc.2014.2.2.1 fatcat:jwb2tjwwq5hq7b2ytx6aspr7um
« Previous Showing results 1 — 15 out of 1,714 results