Communication complexity of group key distribution
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Communications of the ACM
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Security-aware ad hoc routing for wireless networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Handbook of Applied Cryptography
Handbook of Applied Cryptography
An on-demand secure routing protocol resilient to byzantine failures
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Secure ad hoc on-demand distance vector routing
ACM SIGMOBILE Mobile Computing and Communications Review
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Society and Group Oriented Cryptography: A New Concept
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Efficient Generation of Shared RSA Keys (Extended Abstract)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
A Simplified Approach to Threshold and Proactive RSA
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Fully Distributed Threshold RSA under Standard Assumptions
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Towards a Survivable Security Architecture for Ad-Hoc Networks
Revised Papers from the 9th International Workshop on Security Protocols
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Computing inverses over a shared secret modulus
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Practical threshold signatures
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Key agreement in ad hoc networks
Computer Communications
IEEE Network: The Magazine of Global Internetworking
Efficient and robust key management for large mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Robust RSA distributed signatures for large-scale long-lived ad hoc networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Efficient and robust key management for large mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Computers and Electrical Engineering
EURASIP Journal on Wireless Communications and Networking
Towards dual fallible agreement in a virtual subnet network
AsiaCSN '07 Proceedings of the Fourth IASTED Asian Conference on Communication Systems and Networks
Trust-based route selection in dynamic source routing
iTrust'06 Proceedings of the 4th international conference on Trust Management
Hi-index | 0.00 |
The use of a threshold certificate authority to provide cryptographic key management in mobile ad hoc networks has been suggested in the literature. We have designed and implemented such a key management service for our ad hoc networking test bed. In this paper we describe our use of distributed shared RSA key generation techniques to create a threshold certificate authority 'from scratch'. Our goal is to create a scaleable key management solution, which does not rely on prior infrastructure for its inception, and as such is formed in a truly ad hoc manner, compatible with the formation of the network itself.