EISM: An Efficient ID-based Signcryption Scheme for Multi-PKG Multihop Wireless Networks of Mobile Hosts
暂无分享,去创建一个
Shuai Liu | Wenbo He | Zhong Xu | Ruiping Ma | Ruiping Ma | Wenbo He | Shuai Liu | Zhong Xu
[1] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[2] K. C. Reddy,et al. Signcryption scheme for Identity-based Cryptosystems , 2003, IACR Cryptol. ePrint Arch..
[3] Xiaotie Deng,et al. An Efficient Signcryption Scheme with Key Privacy , 2007, EuroPKI.
[4] Jean-Jacques Quisquater,et al. A new identity based signcryption scheme from pairings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).
[5] Jean-Jacques Quisquater,et al. Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups , 2004, Public Key Cryptography.
[6] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[7] Fagen Li,et al. An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks , 2007, ACNS.
[8] Manik Lal Das,et al. Securing Wireless Sensor Networks with Public Key Techniques , 2008, Ad Hoc Sens. Wirel. Networks.
[9] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[10] Liqun Chen,et al. Improved Identity-Based Signcryption , 2005, Public Key Cryptography.
[11] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[12] Victor C. M. Leung,et al. Secure Routing for Mobile Ad Hoc Networks , 2006 .
[13] Willy Susilo,et al. Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security , 2006, IACR Cryptol. ePrint Arch..
[14] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[15] Liqun Chen,et al. Identity based authenticated key agreement protocols from pairings , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..
[16] John Malone-Lee,et al. Identity-Based Signcryption , 2002, IACR Cryptol. ePrint Arch..
[17] Tsz Hon Yuen,et al. Fast and Proven Secure Blind Identity-Based Signcryption from Pairings , 2005, CT-RSA.
[18] Paulo S. L. M. Barreto,et al. Efficient and Forward-Secure Identity-Based Signcryption , 2004, IACR Cryptol. ePrint Arch..
[19] Craig Gentry,et al. Certificate-Based Encryption and the Certificate Revocation Problem , 2003, EUROCRYPT.
[20] Dharma P. Agrawal,et al. TIDS: threshold and identity-based security scheme for wireless ad hoc networks , 2004, Ad Hoc Networks.
[21] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[22] Ram Ramanathan,et al. Topology control of multihop wireless networks using transmit power adjustment , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[23] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[24] Sangjin Kim,et al. Enhanced ID-Based Authenticated Key Agreement Protocols for a Multiple Independent PKG Environment , 2005, ICICS.
[25] Yi Mu,et al. Reducing security overhead for mobile networks , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[26] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.