메뉴 건너뛰기




Volumn 34, Issue 3, 2011, Pages 485-493

TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks

Author keywords

Efficient implementation; Identity based cryptography; Key distribution; Pairing based cryptography; Sensor networks

Indexed keywords

32-BIT PROCESSORS; EFFICIENT IMPLEMENTATION; ELLIPTIC CURVE CRYPTOSYSTEMS; IDENTITY BASED CRYPTOGRAPHY; IDENTITY-BASED; KEY DISTRIBUTION; NON-INTERACTIVE; NON-INTERACTIVE PROTOCOLS; PAIRING-BASED CRYPTOGRAPHY; PUBLIC KEYS; SYMMETRIC CRYPTOSYSTEMS;

EID: 78751642743     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2010.05.013     Document Type: Article
Times cited : (153)

References (63)
  • 4
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • D. Boneh, and M. Franklin Identity-based encryption from the weil pairing SIAM Journal of Computing 32 3 2003 586 615 also appeared in CRYPTO'01
    • (2003) SIAM Journal of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 9
    • 0036870095 scopus 로고    scopus 로고
    • Mica: A wireless platform for deeply embedded networks
    • J.L. Hill, and D.E. Culler Mica: A wireless platform for deeply embedded networks IEEE Micro 22 6 2002 12 24
    • (2002) IEEE Micro , vol.22 , Issue.6 , pp. 12-24
    • Hill, J.L.1    Culler, D.E.2
  • 15
  • 17
    • 10044284351 scopus 로고    scopus 로고
    • LEAP: Efficient security mechanisms for large-scale distributed sensor networks
    • Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
    • S. Zhu, S. Setia, and S. Jajodia LEAP: efficient security mechanisms for large scale distributed sensor networks 10th ACM Conference on Computer and communication security (CCS'03) 2003 ACM Press 62 72 (Pubitemid 40673789)
    • (2003) Proceedings of the ACM Conference on Computer and Communications Security , pp. 62-72
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 21
  • 22
    • 35048867517 scopus 로고    scopus 로고
    • Combinatorial design of key distribution mechanisms for wireless sensor networks
    • S.A. amtepe, and B. Yener Combinatorial design of key distribution mechanisms for wireless sensor networks P. Samarati, P.Y.A. Ryan, D. Gollmann, R. Molva, Ninth European Symposium on Research Computer Security (ESORICS'04) LNCS Vol. 3193 2004 Springer 293 308
    • (2004) Ninth European Symposium on Research Computer Security (ESORICS'04), LNCS , vol.3193 , pp. 293-308
    • Amtepe, S.A.1    Yener, B.2
  • 24
    • 16644374371 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • DOI 10.1145/1053283.1053287
    • D. Liu, P. Ning, and R. Li Establishing pairwise keys in distributed sensor networks ACM Transactions on Information and System Security 8 1 2005 41 77 also appeared in ACM CCS'03 (Pubitemid 40479429)
    • (2005) ACM Transactions on Information and System Security , vol.8 , Issue.1 , pp. 41-77
    • Liu, D.1    Ning, P.2    Rongfang, L.I.3
  • 33
    • 23944461491 scopus 로고    scopus 로고
    • A one round protocol for tripartite Diffie-Hellman
    • A. Joux A one round protocol for tripartite Diffie-Hellman Journal of Cryptology 17 4 2004 263 276 also appeared in ANTS-IV
    • (2004) Journal of Cryptology , vol.17 , Issue.4 , pp. 263-276
    • Joux, A.1
  • 42
    • 38549149186 scopus 로고    scopus 로고
    • Another look at square-roots (and other less common operations) in fields of even characteristic
    • R.M. Avanzi Another look at square-roots (and other less common operations) in fields of even characteristic C.M. Adams, A. Mi ri, M.J. Wiener, 14th International Workshop on Selected Areas in Cryptography (SAC 2007) LNCS Vol. 4876 2007 Springer 138 154
    • (2007) 14th International Workshop on Selected Areas in Cryptography (SAC 2007), LNCS , vol.4876 , pp. 138-154
    • Avanzi, R.M.1
  • 46
    • 78751650197 scopus 로고    scopus 로고
    • Atmel Corporation, AVR Studio 4, URL
    • Atmel Corporation, AVR Studio 4, URL , 2005.
    • (2005)
  • 54
    • 33745726712 scopus 로고    scopus 로고
    • Security considerations and key negotiation techniques for power constrained sensor networks
    • B. Doyle, S. Bell, A.F. Smeaton, K. McCusker, and N. O'Connor Security considerations and key negotiation techniques for power constrained sensor networks The Computer Journal 49 4 2006 443 453
    • (2006) The Computer Journal , vol.49 , Issue.4 , pp. 443-453
    • Doyle, B.1    Bell, S.2    Smeaton, A.F.3    McCusker, K.4    O'Connor, N.5
  • 62
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the weil pairing
    • D. Boneh, B. Lynn, and H. Schacham Short signatures from the weil pairing Journal of Cryptology 17 4 2004 297 319
    • (2004) Journal of Cryptology , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Schacham, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.