메뉴 건너뛰기




Volumn 2, Issue 3-4, 2007, Pages 272-283

Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks

Author keywords

anonymity; blind signature; IBE; identity based encryption decryption; pairing

Indexed keywords


EID: 66249092571     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/ijsn.2007.013180     Document Type: Article
Times cited : (47)

References (27)
  • 6
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Boneh, D. and Franklin, M. (2003) ‘Identity-based encryption from the weil pairing’, SIAM Journal of Computing, Vol. 3, pp.586–615.
    • (2003) SIAM Journal of Computing , vol.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 7
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the weil pairing
    • Volume 2248 ofLNCS
    • Boneh, D., Lynn, B. and Shacham, H. (2001) ‘Short signatures from the weil pairing’, Proceedings of the Asiacrypt 2001, Volume 2248 ofLNCS, pp.514–532.
    • (2001) Proceedings of the Asiacrypt 2001 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 11
    • 84952958717 scopus 로고    scopus 로고
    • Proceedings of I-NetSec04: 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems
    • Díaz, C. and Preneel, B. (2004) ‘Taxonomy of mixes and dummy traffic’, Proceedings of I-NetSec04: 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems.
    • (2004) Taxonomy of mixes and dummy traffic
    • Díaz, C.1    Preneel, B.2
  • 13
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • Springer-Verlag
    • Fujisaki, E. and Okamoto, T. (1999) ‘Secure integration of asymmetric and symmetric encryption schemes’, Proceedings of the CRYPTO 99, Springer-Verlag, pp.537–554.
    • (1999) Proceedings of the CRYPTO 99 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 14
    • 34247344534 scopus 로고    scopus 로고
    • Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systems
    • Huang, D. (2006) ‘Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systems’, Proceedings of ACM Workshop on Wireless Security (WiSe).
    • (2006) Proceedings of ACM Workshop on Wireless Security (WiSe)
    • Huang, D.1
  • 15
    • 3042632485 scopus 로고    scopus 로고
    • ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
    • Kong, J. and Hong, X. (2003) ‘ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks’, ACM MobiHoc.
    • (2003) ACM MobiHoc
    • Kong, J.1    Hong, X.2
  • 20
  • 24
    • 84952968531 scopus 로고    scopus 로고
    • In all our following discussions, without special notation, we use the terms ‘pseudonym’ and ‘public key’ interchangeably
    • In all our following discussions, without special notation, we use the terms ‘pseudonym’ and ‘public key’ interchangeably.
  • 25
    • 84952969196 scopus 로고    scopus 로고
    • To get the admission to the anonymous communication system, the AU may rely on an anonymous credential system such as (Camenisch and Lysyanskaya, 2001) in order to derive a certificate
    • To get the admission to the anonymous communication system, the AU may rely on an anonymous credential system such as (Camenisch and Lysyanskaya, 2001) in order to derive a certificate.
  • 26
    • 84952956065 scopus 로고    scopus 로고
    • Pfitzmann and Hansen (2005) referred public pseudonyms to phone numbers, e-mail addresses, mail addresses and so on, which can be used as pseudonyms for the subjects’s identities. Since a public pseudonym can be easily linked to a unique subject, we consider the public pseudonym as another form of the identity
    • Pfitzmann and Hansen (2005) referred public pseudonyms to phone numbers, e-mail addresses, mail addresses and so on, which can be used as pseudonyms for the subjects’s identities. Since a public pseudonym can be easily linked to a unique subject, we consider the public pseudonym as another form of the identity.
  • 27
    • 84952958239 scopus 로고    scopus 로고
    • The hash function H is not used in PBE scheme. Its usage will be describe in our certificate scheme in the Section 5
    • The hash function H is not used in PBE scheme. Its usage will be describe in our certificate scheme in the Section 5.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.