메뉴 건너뛰기




Volumn , Issue , 2007, Pages 86-91

Forward-secure sequential aggregate authentication

Author keywords

Aggregate signatures; Authentication schemes; Forward security; Key compromise; Sensors; Signature schemes

Indexed keywords

CRYPTOGRAPHY; DATA STRUCTURES; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; WIRELESS SENSOR NETWORKS;

EID: 34548802484     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2007.18     Document Type: Conference Paper
Times cited : (86)

References (22)
  • 1
    • 84937427768 scopus 로고    scopus 로고
    • A new forward-secure digital signature scheme
    • M. Abdalla, and L. Reyzin. "A new forward-secure digital signature scheme." In ASIACRYPT 2000, pp. 116-129, 2000.
    • (2000) ASIACRYPT 2000 , pp. 116-129
    • Abdalla, M.1    Reyzin, L.2
  • 3
    • 34548755375 scopus 로고    scopus 로고
    • K. Barr, and K. Asanovic. Energy aware lossless data compression. In Proc. of MobiSys'03. San Francisco, CA, May 2003.
    • K. Barr, and K. Asanovic. "Energy aware lossless data compression." In Proc. of MobiSys'03. San Francisco, CA, May 2003.
  • 4
    • 79958074367 scopus 로고    scopus 로고
    • A forward-secure digital signature scheme
    • Proc. of Adances in Cryptology, Crypto 99, Aug
    • M. Bellare, and S. K. Miner. "A forward-secure digital signature scheme". In Proc. of Adances in Cryptology - Crypto 99, LNCS Vol 1666:431-448, Aug. 1999.
    • (1999) LNCS , vol.1666 , pp. 431-448
    • Bellare, M.1    Miner, S.K.2
  • 5
    • 35248891000 scopus 로고    scopus 로고
    • M. Bellare, and B. Yee. Forward-Security in Private-Key Cryptography. In Proceedings of CT-RSA'03, LNCS 2612, M. Joye ed, Springer-Verlag, 2003.
    • M. Bellare, and B. Yee. "Forward-Security in Private-Key Cryptography". In Proceedings of CT-RSA'03, LNCS Vol. 2612, M. Joye ed, Springer-Verlag, 2003.
  • 6
    • 23044435711 scopus 로고    scopus 로고
    • D. Boneh, B. Lynn, and H. Shacham. Short signatures from the Weil pairing. J. Cryptology, 17(4):297-319, Sept. 2004. Extended abstract in Proceedings of Asiacrypt 2001.
    • D. Boneh, B. Lynn, and H. Shacham. "Short signatures from the Weil pairing". J. Cryptology, 17(4):297-319, Sept. 2004. Extended abstract in Proceedings of Asiacrypt 2001.
  • 7
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps
    • Proc. of Eurocrypt 2003, May
    • D. Boneh, C. Gentry, B. Lynn, and H. Shacham. "Aggregate and verifiably encrypted signatures from bilinear maps". In Proc. of Eurocrypt 2003, LNCS 2656:416-432, May 2003.
    • (2003) LNCS , vol.2656 , pp. 416-432
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 9
    • 0031375570 scopus 로고    scopus 로고
    • Optimal resilience proactive public-key cryptosystems
    • Y. Frankel, P. Gemmell, P.D. MacKenzie, and M. Yung. "Optimal resilience proactive public-key cryptosystems". In FOCS, 1997.
    • (1997) FOCS
    • Frankel, Y.1    Gemmell, P.2    MacKenzie, P.D.3    Yung, M.4
  • 10
    • 84969368443 scopus 로고
    • An identity-based key-exchange protocol. Advances in Cryptology EuroCrypt'89
    • C. G. Gunther. "An identity-based key-exchange protocol." Advances in Cryptology EuroCrypt'89. LNCS 434, pp. 29-37, 1990.
    • (1990) LNCS , vol.434 , pp. 29-37
    • Gunther, C.G.1
  • 12
    • 0036375244 scopus 로고    scopus 로고
    • Impact of network density on data aggregation in wireless sensor networks
    • C. Intanagonwiwat, D. Estrin, R. Govindan, and J. Heidemann. "Impact of network density on data aggregation in wireless sensor networks". In ICDCS'02, pp. 457-458. 2002.
    • (2002) ICDCS'02 , pp. 457-458
    • Intanagonwiwat, C.1    Estrin, D.2    Govindan, R.3    Heidemann, J.4
  • 13
    • 84880879872 scopus 로고    scopus 로고
    • Forward-secure signatures with optimal signing and verifying
    • Proc. of Advances in Cryptology, Crypto'01, Aug
    • G. Itkis, and L. Reyzin. "Forward-secure signatures with optimal signing and verifying". In Proc. of Advances in Cryptology - Crypto'01, LNCS 2139:332-354, Aug. 2001.
    • (2001) LNCS , vol.2139 , pp. 332-354
    • Itkis, G.1    Reyzin, L.2
  • 17
    • 34548794350 scopus 로고    scopus 로고
    • Sequential aggregate signatures from trapdoor permutations
    • Proc. of Eurocrypt 2004, Nov
    • A. Lysyanskaya, S. Micali, L. Reyzin, and H. Shacham. "Sequential aggregate signatures from trapdoor permutations." In Proc. of Eurocrypt 2004, LNCS 3027, pp. 245-254, Nov. 2001.
    • (2001) LNCS , vol.3027 , pp. 245-254
    • Lysyanskaya, A.1    Micali, S.2    Reyzin, L.3    Shacham, H.4
  • 18
    • 34548728918 scopus 로고    scopus 로고
    • Forward-secure sequential aggregate authentication
    • D. Ma, and G. Tsudik. "Forward-secure sequential aggregate authentication". IACR ePrint 2007/052.
    • IACR ePrint 2007/052
    • Ma, D.1    Tsudik, G.2
  • 20
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • A. Perrig, J. Stankovic, and D. Wagner. "Security in wireless sensor networks". ACM Commun., 47(6):53-57, 2004.
    • (2004) ACM Commun , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3
  • 22
    • 34248672225 scopus 로고    scopus 로고
    • SDAP: A secure hop-by-hop data aggregation protocol for sensor networks
    • May
    • Y. Yang, X. Wang, S. Zhu, and G. Cao. "SDAP: a secure hop-by-hop data aggregation protocol for sensor networks". In ACM MOBIHOC'06. May 2006.
    • (2006) ACM MOBIHOC'06
    • Yang, Y.1    Wang, X.2    Zhu, S.3    Cao, G.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.