首页 | 本学科首页   官方微博 | 高级检索  
     


Cryptographic techniques for mobile ad-hoc networks
Authors:Vanesa  Javier  Paz  Carla  
Affiliation:aDept. d’Enginyeria Informàtica i Matemàtiques, Universitat Rovira i Virgili (URV), Av. Països Catalans, 26, 43007 Tarragona, Spain;bIIIA, Artificial Intelligence Research Institute; CSIC, Spanish National Research Council Campus UAB s/n, 08193 Bellaterra, Spain;cDept. Matemàtica Aplicada IV, Universitat Politècnica de Catalunya (UPC), C/Jordi Girona, 1-3, Campus Nord, Mòdul C-3, 08034 Barcelona, Spain
Abstract:In this paper, we propose some cryptographic techniques to securely set up a mobile ad-hoc network. The process is fully self-managed by the nodes, without any trusted party. New nodes can join the network and are able to obtain the same capabilities as initial nodes; further, each node can obtain a pair of secret/public keys to secure and authenticate its communication. Two additional features of our system are that it allows to implement threshold operations (signature or decryption) involving subgroups of nodes in the network and that any subgroup with a small number of nodes (between 2 and 6) can obtain a common secret key without any communication after the set up phase.
Keywords:Mobile ad-hoc networks  Secret sharing techniques  Identity-based cryptography  Threshold cryptography
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号