메뉴 건너뛰기




Volumn 80, Issue 3, 2014, Pages 533-545

Broadcast encryption based non-interactive key distribution in MANETs

Author keywords

Ad hoc network; Broadcast encryption; Identity based; Key distribution; Provable security

Indexed keywords

AD HOC NETWORKS; EFFICIENCY; MOBILE AD HOC NETWORKS; NETWORK SECURITY; PUBLIC KEY CRYPTOGRAPHY;

EID: 84891936588     PISSN: 00220000     EISSN: 10902724     Source Type: Journal    
DOI: 10.1016/j.jcss.2013.06.009     Document Type: Article
Times cited : (38)

References (39)
  • 3
    • 33747827563 scopus 로고    scopus 로고
    • Key management using certificate-based cryptosystem in ad hoc networks
    • F. Li, J. Gao, S. Liu, and Y. Hu Key management using certificate-based cryptosystem in ad hoc networks Journal of Shanghai Jiaotong University 11 2 2006
    • (2006) Journal of Shanghai Jiaotong University , vol.11 , Issue.2
    • Li, F.1    Gao, J.2    Liu, S.3    Hu, Y.4
  • 7
    • 15244360279 scopus 로고    scopus 로고
    • An efficient key predistribution scheme for ad hoc network security
    • M. Ramkumar, and N. Memon An efficient key predistribution scheme for ad hoc network security IEEE Journal on Selected Areas in Communications 23 3 2005 611 621
    • (2005) IEEE Journal on Selected Areas in Communications , vol.23 , Issue.3 , pp. 611-621
    • Ramkumar, M.1    Memon, N.2
  • 8
    • 33845940708 scopus 로고    scopus 로고
    • Securing ad hoc networks with 'asymmetric' probabilistic key predistribution schemes
    • M. Ramkumar Securing ad hoc networks with 'asymmetric' probabilistic key predistribution schemes IEEE Information Assurance Workshop 2006 290 296
    • (2006) IEEE Information Assurance Workshop , pp. 290-296
    • Ramkumar, M.1
  • 9
    • 38449094126 scopus 로고    scopus 로고
    • Multigrid based key predistribution scheme in ad hoc networks
    • Lecture Notes in Computer Science
    • C. Liu, and H. Jiang Multigrid based key predistribution scheme in ad hoc networks Third International Conference on Mobile ad-hoc and Sensor Networks Lecture Notes in Computer Science vol. 4864 2007 749 759
    • (2007) Third International Conference on Mobile Ad-hoc and Sensor Networks , vol.4864 , pp. 749-759
    • Liu, C.1    Jiang, H.2
  • 16
    • 20444502239 scopus 로고    scopus 로고
    • An ID-based broadcast encryption scheme for key distribution
    • X.J. Du, Y. Wang, J.H. Ge, and Y.M. Wang An ID-based broadcast encryption scheme for key distribution IEEE Transactions on Broadcasting 51 2 2005 264 266
    • (2005) IEEE Transactions on Broadcasting , vol.51 , Issue.2 , pp. 264-266
    • Du, X.J.1    Wang, Y.2    Ge, J.H.3    Wang, Y.M.4
  • 19
    • 35048832490 scopus 로고    scopus 로고
    • An uninstantiable random-oracle-model scheme for a hybrid-encryption problem
    • Lecture Notes in Computer Science
    • M. Bellare, A. Boldyreva, and A. Palacio An uninstantiable random-oracle-model scheme for a hybrid-encryption problem Proceedings of EUROCRYPT04 Lecture Notes in Computer Science vol. 3027 2004 171 188
    • (2004) Proceedings of EUROCRYPT04 , vol.3027 , pp. 171-188
    • Bellare, M.1    Boldyreva, A.2    Palacio, A.3
  • 20
    • 84979291225 scopus 로고
    • Broadcast encryption
    • Lecture Notes in Computer Science
    • A. Fiat, and M. Naor Broadcast encryption Proceedings of CRYPTO94 Lecture Notes in Computer Science vol. 773 1994 480 491
    • (1994) Proceedings of CRYPTO94 , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 21
    • 33745166648 scopus 로고    scopus 로고
    • Collusion resistant broadcast encryption with short ciphertexts and private keys
    • Lecture Notes in Computer Science
    • D. Boneh, C. Gentry, and B. Waters Collusion resistant broadcast encryption with short ciphertexts and private keys Proceedings of Crypto05 Lecture Notes in Computer Science vol. 3621 2005 258 275
    • (2005) Proceedings of Crypto05 , vol.3621 , pp. 258-275
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 22
    • 36348947024 scopus 로고    scopus 로고
    • Comments on an efficient ID-based broadcast encryption scheme
    • H.Y. Chien Comments on an efficient ID-based broadcast encryption scheme IEEE Transactions on Broadcasting 53 4 2007 809 810
    • (2007) IEEE Transactions on Broadcasting , vol.53 , Issue.4 , pp. 809-810
    • Chien, H.Y.1
  • 23
    • 38149117029 scopus 로고    scopus 로고
    • Identity-based broadcast encryption with constant size ciphertexts and private keys
    • Lecture Notes in Computer Science
    • C. Delerablee Identity-based broadcast encryption with constant size ciphertexts and private keys Proceedings of Asiacrypt07 Lecture Notes in Computer Science vol. 4833 2007 200 215
    • (2007) Proceedings of Asiacrypt07 , vol.4833 , pp. 200-215
    • Delerablee, C.1
  • 24
    • 50549101800 scopus 로고    scopus 로고
    • Public key broadcast encryption schemes with shorter transmissions
    • J. Park, H. Kim, M. Sung, and D. Lee Public key broadcast encryption schemes with shorter transmissions IEEE Transactions on Broadcasting 54 3 2008 401 411
    • (2008) IEEE Transactions on Broadcasting , vol.54 , Issue.3 , pp. 401-411
    • Park, J.1    Kim, H.2    Sung, M.3    Lee, D.4
  • 27
    • 84856791522 scopus 로고    scopus 로고
    • Identity-based broadcast encryption based on ad hoc networks
    • J. Sun, Y. Hu, and L. Zhang Identity-based broadcast encryption based on ad hoc networks Computer Science 38 2 2011 46 49
    • (2011) Computer Science , vol.38 , Issue.2 , pp. 46-49
    • Sun, J.1    Hu, Y.2    Zhang, L.3
  • 29
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • D. Boneh, and M. Franklin Identity-based encryption from the Weil pairing SIAM Journal on Computing 32 3 2003 586 615
    • (2003) SIAM Journal on Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 31
    • 84871565550 scopus 로고    scopus 로고
    • A communication efficient group key distribution scheme for MANETs
    • NSS (this paper is an extension version of the paper published in NSS 2012)
    • Y. Yang A communication efficient group key distribution scheme for MANETs Proceedings of the 6th International Conference on Network and System Security NSS 2012 361 372 (this paper is an extension version of the paper published in NSS 2012)
    • (2012) Proceedings of the 6th International Conference on Network and System Security , pp. 361-372
    • Yang, Y.1
  • 33
    • 67650659197 scopus 로고    scopus 로고
    • Adaptive security in broadcast encryption systems (with short ciphertexts)
    • Lecture Notes in Computer Science
    • C. Gentry, and B. Waters Adaptive security in broadcast encryption systems (with short ciphertexts) Proceedings of Eurocrypt09 Lecture Notes in Computer Science vol. 5479 2009 171 188
    • (2009) Proceedings of Eurocrypt09 , vol.5479 , pp. 171-188
    • Gentry, C.1    Waters, B.2
  • 36
    • 82755161855 scopus 로고    scopus 로고
    • Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups
    • L. Zhang, Y. Hu, and Q. Wu Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups Mathematical and Computer Modelling 55 1-2 2012 12 18
    • (2012) Mathematical and Computer Modelling , vol.55 , Issue.12 , pp. 12-18
    • Zhang, L.1    Hu, Y.2    Wu, Q.3
  • 39
    • 33745855807 scopus 로고    scopus 로고
    • Strongly unforgeable signatures based on computational Diffie-Hellman
    • PKC
    • D. Boneh, E. Shen, and B. Waters Strongly unforgeable signatures based on computational Diffie-Hellman Proceedings of Public Key Cryptography PKC 2006 229 240
    • (2006) Proceedings of Public Key Cryptography , pp. 229-240
    • Boneh, D.1    Shen, E.2    Waters, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.