메뉴 건너뛰기




Volumn 2, Issue , 2003, Pages 814-819

Shared RSA key generation in a mobile ad hoc network

Author keywords

Key management; Mobile Ad hoc network; Shared RSA key generation; Threshold Certificate Authority

Indexed keywords

ALGORITHMS; COMMUNICATION CHANNELS (INFORMATION THEORY); COMPUTER NETWORKS; DISTRIBUTED COMPUTER SYSTEMS; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY; RADIO COMMUNICATION;

EID: 3142670764     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (23)

References (31)
  • 1
    • 84937431456 scopus 로고    scopus 로고
    • Efficient computation modulo a shared secret with application to the generation of shared safe-prime products
    • [ACS02] Crypo'02
    • [ACS02] J.Algesheimer, J.Camenisch, V. Shoup. "Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products." Crypo'02, p417-432 LNCS 2442
    • LNCS , vol.2442 , pp. 417-432
    • Algesheimer, J.1    Camenisch, J.2    Shoup, V.3
  • 2
    • 0034317075 scopus 로고    scopus 로고
    • Key agreement in ad-hoc networks
    • [AG00]
    • [AG00] N.Asokan, P.Ginzboorg. "Key Agreement in ad-hoc networks" Computer Communications, 23:1627-1637, 2000.
    • (2000) Computer Communications , vol.23 , pp. 1627-1637
    • Asokan, N.1    Ginzboorg, P.2
  • 4
    • 84958752287 scopus 로고    scopus 로고
    • Towards a survivable security architecture for ad-hoc networks
    • th international work-shop. Cambridge, UK,April'01
    • th international work-shop. Cambridge, UK,April'01, LNCS 2467, p63-73 2002.
    • (2002) LNCS , vol.2467 , pp. 63-73
    • Aura, T.1    Maki, S.2
  • 5
    • 3142719375 scopus 로고    scopus 로고
    • [Baltimore]
    • [Baltimore] www.baltimore.com
  • 6
    • 33751044073 scopus 로고    scopus 로고
    • Talking to strangers:Authentication in ad-hoc wireless Networks
    • [BSSW02], San Diego, California, February
    • [BSSW02] D. Balfanz, D.K.Smetters, P.Stewart, H.Wong "Talking to strangers:Authentication in ad-hoc wireless Networks" NDSS '02, San Diego, California, February 2002
    • (2002) NDSS '02
    • Balfanz, D.1    Smetters, D.K.2    Stewart, P.3    Wong, H.4
  • 7
    • 84958639277 scopus 로고    scopus 로고
    • Efficient generation of shared RSA keys
    • [BF97] Crypo'97
    • [BF97] D.Boneh, M.Franklin. "Efficient generation of shared RSA keys." Crypo'97, p425-439 LNCS 1294
    • LNCS , vol.1294 , pp. 425-439
    • Boneh, D.1    Franklin, M.2
  • 9
    • 84948954120 scopus 로고    scopus 로고
    • Computing inverses over a shared secret modulus
    • [CGH00]. Eurocrypt'00
    • [CGH00] D.Catalano, R.Gennaro,S.Halevi "Computing inverses over a shared secret modulus". Eurocrypt'00, LNCS 1807, Pages 190-206
    • LNCS , vol.1807 , pp. 190-206
    • Catalano, D.1    Gennaro, R.2    Halevi, S.3
  • 10
    • 85032188633 scopus 로고    scopus 로고
    • Society and group oriented cryptography:A new concept
    • [Des87]. Crypto '87
    • [Des87] Y. Desmedt. "Society and group oriented cryptography:A new concept". Crypto '87, p120-127 LNCS 293
    • LNCS , vol.293 , pp. 120-127
    • Desmedt, Y.1
  • 11
    • 85023809951 scopus 로고    scopus 로고
    • Threshold cryptosystems
    • [DF89], Crypto '89
    • [DF89] Y.Desmedt, Y.Frankel "Threshold Cryptosystems", Crypto '89, p307-315 LNCS 435
    • LNCS , vol.435 , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2
  • 12
    • 84946830669 scopus 로고    scopus 로고
    • Fully distributed threshold RSA under standard assumptions
    • [FS01], Asiacryp '01
    • [FS01] "Fully Distributed Threshold RSA under Standard Assumptions", Asiacryp '01,p310-330 LNCS 2248
    • LNCS , vol.2248 , pp. 310-330
  • 14
    • 84957626176 scopus 로고    scopus 로고
    • Proactive secret sharing or: How to cope with perpetual leakage
    • [hjky95], Crypto'95
    • [hjky95] A.Herzberg,S.Jarecki,H.Krawczyk,M.Yung. "Proactive Secret Sharing or: How to cope with perpetual leakage", Crypto'95, LNCS 963, p339-352.
    • LNCS , vol.963 , pp. 339-352
    • Herzberg, A.1    Jarecki, S.2    Krawczyk, H.3    Yung, M.4
  • 15
    • 0035704362 scopus 로고    scopus 로고
    • Providing robust and ubiquitous security support for mobile ad-hoc networks
    • [KZLLZ00]
    • [KZLLZ00] J.Kong,P.Zerfos,H.Luo,S.Lu,L.Zhang. "Providing Robust and Ubiquitous Security Support for Mobile Ad-hoc Networks". ICNP'01.
    • ICNP'01
    • Kong, J.1    Zerfos, P.2    Luo, H.3    Lu, S.4    Zhang, L.5
  • 16
    • 0008144151 scopus 로고    scopus 로고
    • Ubiquitous and robust authentication services for ad hoc wireless networks
    • [LL00], October'00, UCLA
    • [LL00] H.Luo,S.Lu "Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks". Technical report UCLA-CSD-TR-200030, October'00, UCLA.
    • Technical Report , vol.UCLA-CSD-TR-200030
    • Luo, H.1    Lu, S.2
  • 17
    • 3142662204 scopus 로고    scopus 로고
    • [MIMwikipedia]
    • [MIMwikipedia] http://www.wikipedia.org/wiki/Man-in-the-middle_attack
  • 20
    • 3142753073 scopus 로고    scopus 로고
    • [PGP]
    • [PGP] http://www.pgpi.org
  • 22
    • 84957689308 scopus 로고    scopus 로고
    • A simplified approach to threshold and proactive RSA
    • [R98], Crypto'98
    • [R98] T.Rabin. "A Simplified Approach to Threshold and Proactive RSA",Crypto'98,p 89-104, LNCS 1462
    • LNCS , vol.1462 , pp. 89-104
    • Rabin, T.1
  • 25
    • 84948954277 scopus 로고    scopus 로고
    • Practical threshold signatures
    • [Sho00], Eurocrypt 2000
    • [Sho00] V.Shoup, "Practical Threshold Signatures",Eurocrypt 2000, LNCS 1807,p207-220.
    • LNCS , vol.1807 , pp. 207-220
    • Shoup, V.1
  • 26
    • 3142731002 scopus 로고    scopus 로고
    • [SPKI]
    • [SPKI] http://world.std.com/~cme/html/spki.html
  • 27
    • 3142660709 scopus 로고    scopus 로고
    • [Verisign]
    • [Verisign] www.verisign.com
  • 28
    • 3142738383 scopus 로고    scopus 로고
    • [X509]
    • [X509] http://www.ietf.org/html.charters/pkix-charter.html
  • 31
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • [ZH99]
    • [ZH99] L.Zhou, Z.J.Haas. "Securing Ad Hoc Networks" IEEE Networks, 13(6):24-30,1999.
    • (1999) IEEE Networks , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.