期刊文献+

An efficient proactive RSA scheme for large-scale ad hoc networks 被引量:1

An efficient proactive RSA scheme for large-scale ad hoc networks
下载PDF
导出
摘要 A previous proactive RSA scheme for large-scale ad hoc network has been shown to be faulty. In this paper, we present a new proactive RSA scheme for ad hoc networks, which includes four protocols: the initial key distribution protocol, the share refreshing protocol, the share distribution protocol, and the signature generation protocol. This scheme has two advantages: the building blocks are secure, and the system is efficient. A previous proactive RSA scheme for large-scale ad hoc network has been shown to be faulty. In this paper, we present a new proactive RSA scheme for ad hoc networks, which includes four protocols: the initial key distribution protocol, the share refreshing protocol, the share distribution protocol, and the signature generation protocol. This scheme has two advantages: the building blocks are secure, and the system is efficient.
出处 《Journal of Shanghai University(English Edition)》 CAS 2007年第1期64-67,共4页 上海大学学报(英文版)
基金 Project supported by the National Natural Science Foundation of China(Grant No.60273049)
关键词 ad hoc networks threshold signature proactive secret sharing RSA ad hoc networks, threshold signature, proactive secret sharing, RSA
  • 相关文献

参考文献4

  • 1Kong Jie-jun,,Zerfos P,Luo Hai-yun,Lu Song-wu,Zhang Li-xia.Providing robust and ubiquitous security support for MANET[].IEEE th International Conference on Network Protocols(ICNP).2001
  • 2Jarecki S,Saxena N,Yi J H.Cryptanalyzing the proactive RSA signature scheme in the URSA ad hoc network access control protocol[].ACM Workshop on Security of Ad Hoc and Sensor Networks(SASN).2004
  • 3Luo Hai-yun,Kong Jie-jun,Zerfos P,Lu Song-wu,Zhang Li-xia.URSA:Ubiquitous and robust access control for mobile ad hoc networks[].IEEE/ACM Transactions on Networking(ToN).2004
  • 4Narasimha M,Tsudik G,Yi J H.On the utility of distributed cryptography in P2P and MANETs:the case of membership control[].IEEE th International Conference on Network Protocol(ICNP).2003

同被引文献14

  • 1杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 2HARN L,LIN C L.Detection and identification of cheaters in (t,n) secret sharing scheme[J].Designs Codes and Cryptography,2009,52(1):15-24.
  • 3HERZBERG A,JARECKI S,KRAWCZYK H,et al.Proactive secret sharing or:how to cope with perpetual leakage[A].Coppersmith Ded Advances in Cryptology CRYPTO'95[C].Berlin:Springer Verlag,1995.339-352.
  • 4TANG C M,WU D O,CHRONOPOULOS A T,et al.Efficient multi-party digital signature using adaptive secret sharing for low-power devices in wireless networks[J].IEEE Transactions on Wireless Communications,2009,8(2):882-889.
  • 5YANG J P,RHEE K H,SAKURAI K.A proactive secret sharing for server assisted threshold signatures[A].2nd International Conference on High Performance Computing and Communications (HPCC2006)[C].Munich Germany,Berlin:Springer,2006.250-259.
  • 6WANG S J,TSAI Y R,CHEN P Y.Proactive (k,n) threshold secret sharing scheme with variant k and n[A].IEEE-PROCEEDINGS,2007 International Conference on Intelligent Pervasive Computing[C].Jeju Island Korea,2007.117-120.
  • 7SUN H,ZHENG X,YU Y.A proactive secret sharing scheme based on elliptic curve cryptography[A].Education Technology and Computer Science[C].2009.ETCS '09.First International Workshop,Wuhan China,2009.666 -669.
  • 8LI F,SHANG J W,LI D X.A proactive secure multi-secret sharing threshold scheme[A].The 8th ACIS International Conference on Software Engineering,Artificial Intelligence,Networking and Parallel/Distributed Computing(SNPD2007)[C].Qingdao,China,2007.105-110.
  • 9ZHOU L D,SCHNEIDER F B,RENESSE R V,et al.APSS:proactive secret sharing in asynchronous systems[J].ACM Transactions on Information and System Security,2005,8(3):259-286.
  • 10ASAEDA H,RAHMAN M,TOYAMA Y.Structuring proactive secret sharing in mobile ad-hoc networks[A].1st International Symposium on Wireless Pervasive Computing,Phuket Thailand,International Symposium on Wireless Pervasive Computing[C].2006.342-347.

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部