Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks
暂无分享,去创建一个
[1] Dharma P. Agrawal,et al. Threshold and identity-based key management and authentication for wireless ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[2] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[3] Craig Gentry,et al. Certificate-Based Encryption and the Certificate Revocation Problem , 2003, EUROCRYPT.
[4] Kenneth G. Paterson,et al. Key Agreement Using Statically Keyed Authenticators , 2004, ACNS.
[5] Liqun Chen,et al. Applications of Multiple Trust Authorities in Pairing Based Cryptosystems , 2002, InfraSec.
[6] William A. Arbaugh,et al. Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[7] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.
[8] Guang Gong,et al. Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation , 2006 .
[9] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[10] Kenneth G. Paterson,et al. Cryptography from Pairings: A Snapshot of Current Research , 2008 .
[11] Byoungcheon Lee,et al. Secure Key Issuing in ID-based Cryptography , 2004, ACSW.
[12] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[13] Sang-Jae Moon,et al. How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes , 2005, ICISS.