메뉴 건너뛰기




Volumn 16, Issue 1, 2014, Pages 29-39

Provably secure online/off-line identity-based signature scheme for wireless sensor network

Author keywords

BDHP; Bilinear pairing; Multi signature; Online off line identity based signature scheme

Indexed keywords

BDHP; BILINEAR DIFFIE-HELLMAN PROBLEM; BILINEAR PAIRING; HOSTILE ENVIRONMENTS; IDENTITY-BASED SIGNATURE SCHEME; KEY ESTABLISHMENT PROTOCOL; MULTI-SIGNATURE; MUTUAL AUTHENTICATION;

EID: 84893634359     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (29)

References (18)
  • 1
    • 77952181307 scopus 로고    scopus 로고
    • Anal-ysis of public-key cryptography for wireless sensor networks security
    • World Academy of Science, Engineering and Technology
    • F. Amin, A. H Jahangir, and H. Rasifard. "Anal-ysis of public-key cryptography for wireless sensor networks security,". tech. rep., World Academy of Science, Engineering and Technology, 2008.
    • (2008) tech. rep.
    • Amin, F.1    Jahangir, A.H.2    Rasifard, H.3
  • 4
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps
    • D. Boneh, C. Gentry, B. Lynn, and H. Shacham, "Aggregate and verifiably encrypted signatures from bilinear maps," in Proceedings of Eurocrypt '03, vol. LNCS2656, pp. 416-432, 2003.
    • (2003) in Proceedings of Eurocrypt '03 , vol.LNCS 2656 , pp. 416-432
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 5
    • 24944433217 scopus 로고    scopus 로고
    • Identity-based aggregate and verifiably encrypted signatures from bilinear pairing
    • X. Cheng, J. Liu, and X. Wang, "Identity-based aggregate and verifiably encrypted signatures from bilinear pairing," in Proceedings of ICCSA, vol. LNCS 3483, pp. 1046-1054, 2005.
    • (2005) in Proceedings of ICCSA , vol.LNCS 3483 , pp. 1046-1054
    • Cheng, X.1    Liu, J.2    Wang, X.3
  • 7
    • 30344445246 scopus 로고    scopus 로고
    • Enhancing base station security in wireless sensor netowrks: University of colorado, department of computer science. technical report cu-us-951-03
    • J. Deng, R. Han, and S. Mishra. "Enhancing base station security in wireless sensor netowrks: University of colorado, department of computer science. technical report cu-us-951-03,". tech. rep.
    • tech. rep.
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 9
    • 33745849655 scopus 로고    scopus 로고
    • dentity-based aggregate signatures
    • C. Gentry and Z. Ramzan, "dentity-based aggregate signatures," in Proceedings of PKC 2006, vol. LNCS 3958, pp. 257-273, 2006.
    • (2006) in Proceedings of PKC 2006 , vol.LNCS 3958 , pp. 257-273
    • Gentry, C.1    Ramzan, Z.2
  • 10
    • 33646251408 scopus 로고    scopus 로고
    • Deterministic identity-based signatures for partial aggregation
    • PAGES =, 2006
    • J. Herranz, "Deterministic identity-based signatures for partial aggregation," The Computer Journal, vol. 49, no. 3, PAGES =, 2006.
    • The Computer Journal , vol.49 , Issue.3
    • Herranz, J.1
  • 11
    • 77952324001 scopus 로고    scopus 로고
    • Universal forgery of the identity-based sequential aggregate signature scheme
    • J. Y. Hwang, D. H. Lee, and M. Yung, "Universal forgery of the identity-based sequential aggregate signature scheme," in ASIACCS, pp. 157-160.
    • in ASIACCS , pp. 157-160
    • Hwang, J.Y.1    Lee, D.H.2    Yung, M.3
  • 12
    • 84893559210 scopus 로고    scopus 로고
    • Efficient online/off-ine identity-based signature for wireless sensor network
    • IACR eprint-2010/03
    • J. K. Liu, J. Baek, J. Zhou, Y. Yang, and J. W. Wong. "Efficient online/off-ine identity-based signature for wireless sensor network,". Tech. Rep. IACR eprint-2010/03, 2010.
    • (2010) Tech. Rep.
    • Liu, J.K.1    Baek, J.2    Zhou, J.3    Yang, Y.4    Wong, J.W.5
  • 14
    • 77649252131 scopus 로고    scopus 로고
    • Security analysis of aggregate signature and batch verification signature schemes
    • IACR eprint-2009/290
    • S. S. D. Selvi, S. S. Vivek, J. Shriram, S. Kalaivani, and C.Pandu Rangan. "Security analysis of aggregate signature and batch verification signature schemes,". Tech. Rep. IACR eprint-2009/290, 2009.
    • (2009) Tech. Rep.
    • Selvi, S.S.D.1    Vivek, S.S.2    Shriram, J.3    Kalaivani, S.4    Pandu Rangan, C.5
  • 15
    • 84893563476 scopus 로고    scopus 로고
    • Wireless sensor networks: Principles and applications microstrain
    • C. Townsend and S. Arms. "Wireless sensor networks: Principles and applications microstrain,". tech. rep.
    • tech. rep.
    • Townsend, C.1    Arms, S.2
  • 16
    • 79951478259 scopus 로고    scopus 로고
    • An aggregate signature scheme with constant pairing operations
    • Y. Wen and J. Ma, "An aggregate signature scheme with constant pairing operations," in CSSE, vol. 3, pp. 830-833, 2008.
    • (2008) in CSSE, vol. 3 , pp. 830-833
    • Wen, Y.1    Ma, J.2
  • 18
    • 24944445896 scopus 로고    scopus 로고
    • Batch verifications with id-based signatures
    • vol. LNCS 3506
    • H. Yoon, J. H. Cheon, and Y. Kim, "Batch verifications with id-based signatures," in Proceedings of ICISC, vol. LNCS 3506, pp. 233-248, 2004.
    • (2004) in Proceedings of ICISC , pp. 233-248
    • Yoon, H.1    Cheon, J.H.2    Kim, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.