Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Provably secure session key distribution: the three party case
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
Key Agreement in Dynamic Peer Groups
IEEE Transactions on Parallel and Distributed Systems
Efficient Identity Based Signature Schemes Based on Pairings
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
A One Round Protocol for Tripartite Diffie-Hellman
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
Tree-based group key agreement
ACM Transactions on Information and System Security (TISSEC)
Secure multicast groups on ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Authenticated key exchange secure against dictionary attacks
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems
IEEE Transactions on Information Theory
Security for cluster based ad hoc networks
Computer Communications
Key agreement in ad hoc networks
Computer Communications
An efficient session key generation for NTDR networks based on bilinear paring
Computer Communications
ID-based key agreement with anonymity for ad hoc networks
EUC'07 Proceedings of the 2007 international conference on Embedded and ubiquitous computing
Privacy-preserving ID-based key agreement protocols for cluster-based MANETs
International Journal of Ad Hoc and Ubiquitous Computing
Privacy-preserving ID-based key agreement protocols for cluster-based MANETs
International Journal of Ad Hoc and Ubiquitous Computing
Hi-index | 0.00 |
As mobile devices with wireless communication capacity become more and more popular, the study on ad hoc networks that offer convenient infrastructure-free communication has arose the attention from both the academic and the industry. However, the previous security schemes proposed for ad hoc networks either suffer from the structure support problems or have security flaws. This paper examines the weaknesses of a Bohio-Miri's recent work, and then proposes our new schemes to enhance the security and the performance. The security of the proposed protocols is proved in the random oracle model.