메뉴 건너뛰기




Volumn 8, Issue 6, 2010, Pages 597-613

Computationally secure self-healing key distribution with revocation in wireless ad hoc networks

Author keywords

Access structure; Computational security; Forward and backward secrecy; Revocation; Self healing; Session key distribution; Wireless networks

Indexed keywords

ACCESS STRUCTURE; COMPUTATIONAL SECURITY; FORWARD AND BACKWARD SECRECY; SELF-HEALING; SESSION KEY;

EID: 77950023367     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2009.11.005     Document Type: Article
Times cited : (31)

References (35)
  • 1
    • 85030481487 scopus 로고
    • How to broadcast a secret
    • Advances in Cryptology, Springer-Verlag
    • Berkovit S. How to broadcast a secret. Advances in Cryptology. Eurocrypt'91, LNCS vol. 547 (1991), Springer-Verlag 536-541
    • (1991) Eurocrypt'91, LNCS , vol.547 , pp. 536-541
    • Berkovit, S.1
  • 3
    • 84955614214 scopus 로고    scopus 로고
    • Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution
    • Springer-Verlag
    • Blundo C., Mattos L.F., and Stinson D. Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution. Advances in Cryptology, Crypto'96, LNCS vol. 1109 (1996), Springer-Verlag
    • (1996) Advances in Cryptology, Crypto'96, LNCS , vol.1109
    • Blundo, C.1    Mattos, L.F.2    Stinson, D.3
  • 6
    • 33646153894 scopus 로고    scopus 로고
    • Definitions and bounds for self-healing key distribution
    • Proceedings of the 31st ICALP 04, Springer, Verlag
    • Blundo C., D'Arco P., Santis A., and Listo M. Definitions and bounds for self-healing key distribution. Proceedings of the 31st ICALP 04. LNCS vol. 3142 (2004), Springer, Verlag 234-245
    • (2004) LNCS , vol.3142 , pp. 234-245
    • Blundo, C.1    D'Arco, P.2    Santis, A.3    Listo, M.4
  • 8
    • 0032661699 scopus 로고    scopus 로고
    • R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, B. Pinkas, Multicast security: a taxonomy and some efficient constructions, in: IEEE INFOCOMM'99, 1999.
    • R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, B. Pinkas, Multicast security: a taxonomy and some efficient constructions, in: IEEE INFOCOMM'99, 1999.
  • 9
  • 11
    • 36349017874 scopus 로고    scopus 로고
    • Improved self-healing key distribution with revocation in wireless sensor network
    • IEEE Communications Society Press
    • Dutta R., and Mukhopadhyay S. Improved self-healing key distribution with revocation in wireless sensor network. Proceedings of WCNC 2007 - Networking (2007), IEEE Communications Society Press
    • (2007) Proceedings of WCNC 2007 - Networking
    • Dutta, R.1    Mukhopadhyay, S.2
  • 12
    • 38049016463 scopus 로고    scopus 로고
    • Efficient self-healing key distributions with revocation for wireless network using one way key chains
    • Proceedings of the 5th ACNS 2007, Springer-Verlag
    • Dutta R., Chang E.-C., and Mukhopadhyay S. Efficient self-healing key distributions with revocation for wireless network using one way key chains. Proceedings of the 5th ACNS 2007. LNCS vol. 4521 (2007), Springer-Verlag
    • (2007) LNCS , vol.4521
    • Dutta, R.1    Chang, E.-C.2    Mukhopadhyay, S.3
  • 14
    • 84979291225 scopus 로고
    • Broadcast encryption
    • Crypto'93, Springer-Verlag
    • Fiat A., and Naor M. Broadcast encryption. Crypto'93. LNCS vol. 773 (1994), Springer-Verlag 480-491
    • (1994) LNCS , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 16
    • 85027123825 scopus 로고
    • New protocols for third-party-based authentication and secure broadcast
    • L. Gong, New protocols for third-party-based authentication and secure broadcast, in: Proceedings of ACM CCS, 1994.
    • (1994) Proceedings of ACM CCS
    • Gong, L.1
  • 18
    • 27644512043 scopus 로고    scopus 로고
    • An efficient key distribution scheme with self-healing property
    • Hong D., and Kang J. An efficient key distribution scheme with self-healing property. IEEE Communication Letters'05 9 (2005) 759-761
    • (2005) IEEE Communication Letters'05 , vol.9 , pp. 759-761
    • Hong, D.1    Kang, J.2
  • 19
    • 33750008721 scopus 로고    scopus 로고
    • Self-healing group key distribution with time-limited node revocation for wireless sensor networks
    • Jiang Y., Lin C., Shi M., and Shen X. Self-healing group key distribution with time-limited node revocation for wireless sensor networks. Ad Hoc Networks 5 1 (2007) 14-23
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 14-23
    • Jiang, Y.1    Lin, C.2    Shi, M.3    Shen, X.4
  • 22
    • 26444491036 scopus 로고    scopus 로고
    • Efficient self-healing key distribution with revocation capability
    • D. Liu, P. Ning, K. Sun, Efficient self-healing key distribution with revocation capability, in: Proceedings of the 10th ACM CCS'03, 2003, pp. 27-31.
    • (2003) Proceedings of the 10th ACM CCS'03 , pp. 27-31
    • Liu, D.1    Ning, P.2    Sun, K.3
  • 23
    • 0003557429 scopus 로고    scopus 로고
    • Key establishment in large dynamic groups using one-way function trees
    • No. 0755, 1998
    • D. McGrew, A. Sherman, Key establishment in large dynamic groups using one-way function trees, TIS Report No. 0755, 1998.
    • TIS Report
    • McGrew, D.1    Sherman, A.2
  • 25
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless users
    • Advances of Cryptology - Crypto'01, Springer-Verlag
    • Naor D., Naor M., and Lotspiech J. Revocation and tracing schemes for stateless users. Advances of Cryptology - Crypto'01. LNCS vol. 2139 (2001), Springer-Verlag 41-62
    • (2001) LNCS , vol.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 27
    • 0034315039 scopus 로고    scopus 로고
    • Secret sharing schemes with bipartite access structure
    • Padro C., and Saez G. Secret sharing schemes with bipartite access structure. IEEE Transactions on Information Theory 46 7 (2000) 2596-2604
    • (2000) IEEE Transactions on Information Theory , vol.46 , Issue.7 , pp. 2596-2604
    • Padro, C.1    Saez, G.2
  • 28
    • 33646832603 scopus 로고    scopus 로고
    • On threshold self-healing key distribution schemes
    • Proceedings of Cryptography and Coding'04, Springer, Verlag
    • Saez G. On threshold self-healing key distribution schemes. Proceedings of Cryptography and Coding'04. LNCS vol. 3796 (2004), Springer, Verlag 340-354
    • (2004) LNCS , vol.3796 , pp. 340-354
    • Saez, G.1
  • 29
    • 0034448865 scopus 로고    scopus 로고
    • New constructions of secure multicast re-keying schemes using perfect hash families
    • R. Safavi-Naini, H. Wang, New constructions of secure multicast re-keying schemes using perfect hash families, in: Proceedings of ACM CCS'00, 2000, pp. 228-234.
    • (2000) Proceedings of ACM CCS'00 , pp. 228-234
    • Safavi-Naini, R.1    Wang, H.2
  • 30
    • 77950019506 scopus 로고    scopus 로고
    • S. Setia, S. Koussih, S. Jajodia, Korons: a scalable group re-keying approach for secure multicast, in: Proceedings of IEEE Symp. on Security and Privacy
    • S. Setia, S. Koussih, S. Jajodia, Korons: a scalable group re-keying approach for secure multicast, in: Proceedings of IEEE Symp. on Security and Privacy.
  • 32
    • 0000028420 scopus 로고    scopus 로고
    • On some methods for unconditionally secure key distribution and broadcast encryption
    • Stinson D.R. On some methods for unconditionally secure key distribution and broadcast encryption. Designs, Codes and Cryptology 12 (1997) 215-243
    • (1997) Designs, Codes and Cryptology , vol.12 , pp. 215-243
    • Stinson, D.R.1
  • 33
    • 0005053804 scopus 로고    scopus 로고
    • Some new results on key distribution patterns and broadcast encryption
    • Stinson D.R., and van Trung T. Some new results on key distribution patterns and broadcast encryption. Designs, Codes and Cryptography 14 (2008) 261-279
    • (2008) Designs, Codes and Cryptography , vol.14 , pp. 261-279
    • Stinson, D.R.1    van Trung, T.2
  • 35
    • 0034780938 scopus 로고    scopus 로고
    • Reliable group re-keying: A performance analysis
    • Y.R. Yang, X.S. Li, X.B. Zhang, S.S. Lam, Reliable group re-keying: a performance analysis, in: ACM SIGCOMM'01, 2001, pp. 27-38.
    • (2001) ACM SIGCOMM'01 , pp. 27-38
    • Yang, Y.R.1    Li, X.S.2    Zhang, X.B.3    Lam, S.S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.