A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
On-line/off-line digital signatures
CRYPTO '89 Proceedings on Advances in cryptology
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
An Identity-Based Signature from Gap Diffie-Hellman Groups
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Reducing Security Overhead for Mobile Networks
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 1
On the Security of Online/Offline Signatures and Multisignatures from ACISP'06
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Efficient ID-Based one-time proxy signature and its application in e-cheque
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Reliable operational services in MANETs by misbehavior-tolerant quorum systems
Proceedings of the 8th International Conference on Network and Service Management
Hi-index | 0.00 |
The security deployment in mobile ad hoc networks is frequently hampered by resource constraints. The current routing systems of mobile ad hoc networks deploy very weak security techniques in order to copy with the computational overhead and bandwidth consumption. In this paper, we present an ID-based online/offline signature scheme which provides a full scale of security with sound performance. We show that our scheme is secure against existential forgery under adaptive chosen message attacks.