메뉴 건너뛰기




Volumn , Issue , 2007, Pages

Key refreshing in identity-based cryptography and its applications in MANETs

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC NETWORKS; CRYPTOGRAPHY; MILITARY COMMUNICATIONS; PUBLIC KEY CRYPTOGRAPHY;

EID: 47949101717     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MILCOM.2007.4454916     Document Type: Conference Paper
Times cited : (17)

References (15)
  • 1
    • 0345490607 scopus 로고    scopus 로고
    • Certiflcateless Public Key Cryptography
    • C.-S. Laih ed, ASIACRYPT 2003
    • S.S. Al-Riyami and K.G. Paterson. Certiflcateless Public Key Cryptography. In C.-S. Laih (ed.), ASIACRYPT 2003, Springer LNCS 2894, pp. 452-473, 2003.
    • (2003) Springer LNCS , vol.2894 , pp. 452-473
    • Al-Riyami, S.S.1    Paterson, K.G.2
  • 2
    • 0027726717 scopus 로고
    • Random Oracles are Practical: A Paradigm for Designing Efficient Protocols
    • ACM Press
    • M. Bellare and P. Rogaway. Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In ACM Conference on Computer and Communications Security 1993, pp. 62-73, ACM Press, 1993.
    • (1993) ACM Conference on Computer and Communications Security , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 3
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • J. Kilian ed, CRYPTO 2001
    • D. Boneh and M.K. Franklin. Identity-Based Encryption from the Weil Pairing. In J. Kilian (ed.), CRYPTO 2001, Springer LNCS Vol. 2139, pp. 213-229, 2001.
    • (2001) Springer LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.K.2
  • 4
    • 28144462281 scopus 로고    scopus 로고
    • Universally Composable Security: A New Paradigm for Cryptographic Protocols. Cryptology ePrint Archive
    • Report 2000/067
    • R. Canetti. Universally Composable Security: A New Paradigm for Cryptographic Protocols. Cryptology ePrint Archive, Report 2000/067, http://eprint.iacr.org/, 2000.
    • (2000)
    • Canetti, R.1
  • 6
    • 70349557354 scopus 로고    scopus 로고
    • Hierarchical ID-Based Cryptography
    • Y Zheng ed, ASIACRYPT 2002
    • C. Gentry and A. Silverberg. Hierarchical ID-Based Cryptography. In Y Zheng (ed.), ASIACRYPT 2002, Springer LNCS Vol. 2501, pp. 548-566, 2002.
    • (2002) Springer LNCS , vol.2501 , pp. 548-566
    • Gentry, C.1    Silverberg, A.2
  • 7
    • 33749611163 scopus 로고    scopus 로고
    • Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation
    • Technical Report CACR 2006-04, Centre for Applied Cryptographic Research (CACR) at the University of Waterloo, Canada
    • K. Hoeper and G. Gong. Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation, Technical Report CACR 2006-04, Centre for Applied Cryptographic Research (CACR) at the University of Waterloo, Canada, 2006.
    • (2006)
    • Hoeper, K.1    Gong, G.2
  • 8
    • 33749603013 scopus 로고    scopus 로고
    • Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks
    • T. Kunz and S.S. Ravi eds, Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference
    • K. Hoeper and G. Gong. Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks. In T. Kunz and S.S. Ravi (eds.), Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, Springer LNCS 4104, pp. 224-237, 2006.
    • (2006) Springer LNCS , vol.4104 , pp. 224-237
    • Hoeper, K.1    Gong, G.2
  • 13
    • 33746100516 scopus 로고    scopus 로고
    • Cryptography from Pairings
    • LE Blake, G. Seroussi and N.P. Smart eds, Advances in Elliptic Curve Cryptography, Cambridge University Press
    • K.G. Paterson. Cryptography from Pairings. In LE Blake, G. Seroussi and N.P. Smart (eds.), Advances in Elliptic Curve Cryptography, London Mathematical Society Lecture Note Series Vol. 317, Cambridge University Press, 2005, pp. 215-251.
    • (2005) London Mathematical Society Lecture Note Series , vol.317 , pp. 215-251
    • Paterson, K.G.1
  • 14
    • 1942473586 scopus 로고    scopus 로고
    • A comparison between traditional Public Key Infrastructures and Identity-Based Cryptography
    • 8(3):57-72, 2003
    • K.G. Paterson and G. Price. A comparison between traditional Public Key Infrastructures and Identity-Based Cryptography. Information Security Technical Report, Vol. 8(3):57-72, 2003.
    • Information Security Technical Report
    • Paterson, K.G.1    Price, G.2
  • 15
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • CR. Blakley and D.Chaum eds, CRYPTO '84
    • A. Shamir. Identity-based cryptosystems and signature schemes. In CR. Blakley and D.Chaum (eds.), CRYPTO '84, Springer LNCS Vol. 196, pp. 47-53, 1985.
    • (1985) Springer LNCS , vol.196 , pp. 47-53
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.