CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Toward Secure Key Distribution in Truly Ad-Hoc Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach
ICNP '03 Proceedings of the 11th IEEE International Conference on Network Protocols
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
ICNP '03 Proceedings of the 11th IEEE International Conference on Network Protocols
The random oracle methodology, revisited
Journal of the ACM (JACM)
An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
A pairwise key predistribution scheme for wireless sensor networks
ACM Transactions on Information and System Security (TISSEC)
A fully collusion resistant broadcast, trace, and revoke system
Proceedings of the 13th ACM conference on Computer and communications security
Efficient Identity Based Signature/Signcryption Scheme in the Standard Model
ISDPE '07 Proceedings of the The First International Symposium on Data, Privacy, and E-Commerce
Identity-based Broadcast Encryption Scheme with Untrusted PKG
ICYCS '08 Proceedings of the 2008 The 9th International Conference for Young Computer Scientists
An Identity-based Broadcast Encryption Protocol for Ad Hoc Networks
ICYCS '08 Proceedings of the 2008 The 9th International Conference for Young Computer Scientists
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
Identity-based broadcast encryption with constant size ciphertexts and private keys
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Multigrid based key predistribution scheme in ad hoc networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Key distribution in mobile ad hoc networks based on message relaying
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Proceedings of the 17th ACM conference on Computer and communications security
Collusion resistant broadcast encryption with short ciphertexts and private keys
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Strongly unforgeable signatures based on computational diffie-hellman
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Practical identity-based encryption without random oracles
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
A Network Coding Approach to Secret Key Distribution
IEEE Transactions on Information Forensics and Security
An efficient key predistribution scheme for ad hoc network security
IEEE Journal on Selected Areas in Communications
A communication efficient group key distribution scheme for MANETs
NSS'12 Proceedings of the 6th international conference on Network and System Security
Hi-index | 0.00 |
This paper proposes an efficient broadcast encryption scheme for key distribution in MANET. No message exchange is required to establish a group key. The communication overhead remains unchanged as group size grows. In order for the group member to obtain session key, only one bilinear pairing computation is required. The proposal is also evaluated through efficiency, security analysis and comparison with other existing schemes. We test the efficiency of the scheme on a modern station through simulation. The performance analysis shows its suitability for large scale MANETs. It is shown that the new scheme is provable secure in standard model. The comparison indicates that this scheme has efficiency surpassing congeneric schemes. Furthermore, an improved scheme against chosen ciphertext attack (CCA) is proposed in order to enhance the security. Thus, the proposal in this paper can not only meet security demands but is also efficient in terms of computation and communication.