메뉴 건너뛰기




Volumn 2006 II, Issue , 2006, Pages 520-527

Identity-based key agreement protocol for mobile ad-hoc networks using bilinear pairing

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC WIRELESS NETWORKS; BILINEAR PAIRING; GROUP KEY MANAGEMENT; MOBILE AD-HOC NETWORKS;

EID: 33845437589     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SUTC.2006.1636220     Document Type: Conference Paper
Times cited : (14)

References (12)
  • 1
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Advances in Cryptology-CRYPTO 2001
    • D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing, Advances in Cryptology-CRYPTO 2001, LNCS 2139, 2001, pp. 213-229.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 2
    • 0032649638 scopus 로고    scopus 로고
    • The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystem
    • G. Frey, M. Muller, and H. Ruck. The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystem. IEEE Transactions on Information Theory, Vol. 45, No. 5, 1999, pp. 1717-1719.
    • (1999) IEEE Transactions on Information Theory , vol.45 , Issue.5 , pp. 1717-1719
    • Frey, G.1    Muller, M.2    Ruck, H.3
  • 3
    • 0034317075 scopus 로고    scopus 로고
    • Key agreement in ad hoc networks
    • N. Asokan and P. Ginzboorg, Key agreement in ad hoc networks, Computer Communications 23, 2000, pp. 1627-1637.
    • (2000) Computer Communications , vol.23 , pp. 1627-1637
    • Asokan, N.1    Ginzboorg, P.2
  • 4
    • 85020598353 scopus 로고
    • Identity based on cryptosystems and signature schemes
    • Shamir. Identity based on cryptosystems and signature schemes. Advances in Cryptology-Crypto'84, 1984, pp. 47-53.
    • (1984) Advances in Cryptology-crypto'84 , pp. 47-53
    • Shamir1
  • 6
    • 84944050090 scopus 로고    scopus 로고
    • Applications of multiple trust authorities in pairing based cryptosystems
    • proceedings of Infrastructure Security Conference 2002, Springer-Verlag
    • L. Chen, K. Harrison, N.P. Smart and D. Soldera. Applications of multiple trust authorities in pairing based cryptosystems. In proceedings of Infrastructure Security Conference 2002, LNCS 2437, Springer-Verlag, 2002, pp. 260-275.
    • (2002) LNCS , vol.2437 , pp. 260-275
    • Chen, L.1    Harrison, K.2    Smart, N.P.3    Soldera, D.4
  • 8
    • 7744225358 scopus 로고    scopus 로고
    • Efficient identity-based security schemes for ad hoc network routing protocols
    • M. Bohio and A. Miri. Efficient identity-based security schemes for ad hoc network routing protocols. Ad hoc networks 2, 2004, pp. 309-317.
    • (2004) Ad Hoc Networks , vol.2 , pp. 309-317
    • Bohio, M.1    Miri, A.2
  • 9
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • C. Boyd, editor, Advances in Cryptology-Asiacrypt 2001, Springer-Verlag
    • Boneh, D. B. Lynn, and H. Shacham. 2001. Short signatures from the Weil pairing. In C. Boyd, editor, Advances in Cryptology-Asiacrypt 2001, LNCS 2248, Springer-Verlag: 514-532.
    • (2001) LNCS , vol.2248 , pp. 514-532
    • Boneh, D.B.L.1    Shacham, H.2
  • 10
    • 0037974305 scopus 로고    scopus 로고
    • Exponent group signature schemes and efficient identity based signature schemes based on pairings
    • F. Hess, exponent group signature schemes and efficient identity based signature schemes based on pairings. Cryptology ePrint Archive, Report 2002/012, 2002. http://eprint.iacr.org/2002/012.
    • (2002) Cryptology EPrint Archive, Report , vol.2002 , Issue.12
    • Hess, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.