Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Toward Hierarchical Identity-Based Encryption
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Hierarchical ID-Based Cryptography
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Admission Control in Peer Groups
NCA '03 Proceedings of the Second IEEE International Symposium on Network Computing and Applications
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
ICNP '03 Proceedings of the 11th IEEE International Conference on Network Protocols
Admission control in Peer-to-Peer: design and performance evaluation
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
On the Distribution and Revocation of Cryptographic Keys in Sensor Networks
IEEE Transactions on Dependable and Secure Computing
Reducing Multicast Traffic Load for Cellular Networks using Ad Hoc Networks
Proceedings of the Second International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks
IEEE Transactions on Mobile Computing
Threshold cryptography in P2P and MANETs: The case of access control
Computer Networks: The International Journal of Computer and Telecommunications Networking
Revocation games in ephemeral networks
Proceedings of the 15th ACM conference on Computer and communications security
Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs
IEEE Transactions on Parallel and Distributed Systems
Efficient chosen-ciphertext secure identity-based encryption with wildcards
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Identity-Based encryption gone wild
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Identity-Based access control for ad hoc groups
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Hi-index | 0.00 |
Wildcard identity-based encryption (IDE) provides an effective means of communicating among groups which do not have a well-defined membership or hierarchy pre-established, as may frequently be the case in dynamic coalition operations. The protection of group communication against compromised nodes is, however, expensive in that it typically requires frequent re-keying in the case of attribute-based IBE or voting-based revocation mechanisms, which can be problematic in multi-hop ad-hoc networks. In this paper we investigate the use of asymmetric communication links such as may be provided by unmanned aerial vehicles to provide efficient revocation mechanisms for small ad-hoc networks. Such link characteristics allow the efficient maintenance and propagation of blacklists as proposed by Saxena et al. and also enable the development of probability and plausibility metrics for revocation requests. We therefore propose a scheme for the distribution of group keys that requires nodes of the group to collaborate in order to obtain the group secret key. Consequently, untrusted nodes are hindered from communicating with other groups. This isolation from untrusted nodes allows to avoid or at least to postpone expensive node revocations which require the rekeying of the whole group.