File Download
  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Providing distributed certificate authority service in mobile ad hoc networks

TitleProviding distributed certificate authority service in mobile ad hoc networks
Authors
KeywordsCluster-based architecture
Distributed CA services
Mobile ad hoc network
PKI
Proactive update
Threshold secret sharing
Issue Date2005
PublisherIEEE, Computer Society.
Citation
Proceedings - First International Conference On Security And Privacy For Emerging Areas In Communications Networks, Securecomm 2005, 2005, v. 2005, p. 149-156 How to Cite?
AbstractIn this paper, we propose an architecture for providing distributed Certificate Authority (CA) service in Mobile Ad Hoc Networks (MANET), based on threshold cryptography. We have two major contributions: 1) we make use of the cluster structure to provide CA service, and design a scheme for locating CA server nodes in MANET; 2) we provide a proactive secret share update protocol, which periodically updates CA secret shares with low system overhead. Compared with existing approaches, our CA architecture provides faster CA services to user nodes at reduced system overhead. © 2005 IEEE.
Persistent Identifierhttp://hdl.handle.net/10722/45868
References

 

DC FieldValueLanguage
dc.contributor.authorDong, Yen_HK
dc.contributor.authorGo, HWen_HK
dc.contributor.authorSui, AFen_HK
dc.contributor.authorLi, VOKen_HK
dc.contributor.authorHui, LCKen_HK
dc.contributor.authorYiu, SMen_HK
dc.date.accessioned2007-10-30T06:37:20Z-
dc.date.available2007-10-30T06:37:20Z-
dc.date.issued2005en_HK
dc.identifier.citationProceedings - First International Conference On Security And Privacy For Emerging Areas In Communications Networks, Securecomm 2005, 2005, v. 2005, p. 149-156en_HK
dc.identifier.urihttp://hdl.handle.net/10722/45868-
dc.description.abstractIn this paper, we propose an architecture for providing distributed Certificate Authority (CA) service in Mobile Ad Hoc Networks (MANET), based on threshold cryptography. We have two major contributions: 1) we make use of the cluster structure to provide CA service, and design a scheme for locating CA server nodes in MANET; 2) we provide a proactive secret share update protocol, which periodically updates CA secret shares with low system overhead. Compared with existing approaches, our CA architecture provides faster CA services to user nodes at reduced system overhead. © 2005 IEEE.en_HK
dc.format.extent258575 bytes-
dc.format.extent4152649 bytes-
dc.format.extent2781 bytes-
dc.format.extent3502 bytes-
dc.format.extent23319 bytes-
dc.format.mimetypeapplication/pdf-
dc.format.mimetypeapplication/pdf-
dc.format.mimetypetext/plain-
dc.format.mimetypetext/plain-
dc.format.mimetypetext/plain-
dc.languageengen_HK
dc.publisherIEEE, Computer Society.en_HK
dc.relation.ispartofProceedings - First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005en_HK
dc.rightsCreative Commons: Attribution 3.0 Hong Kong License-
dc.rights©2005 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.en_HK
dc.subjectCluster-based architectureen_HK
dc.subjectDistributed CA servicesen_HK
dc.subjectMobile ad hoc networken_HK
dc.subjectPKIen_HK
dc.subjectProactive updateen_HK
dc.subjectThreshold secret sharingen_HK
dc.titleProviding distributed certificate authority service in mobile ad hoc networksen_HK
dc.typeConference_Paperen_HK
dc.identifier.emailLi, VOK:vli@eee.hku.hken_HK
dc.identifier.emailHui, LCK:hui@cs.hku.hken_HK
dc.identifier.emailYiu, SM:smyiu@cs.hku.hken_HK
dc.identifier.authorityLi, VOK=rp00150en_HK
dc.identifier.authorityHui, LCK=rp00120en_HK
dc.identifier.authorityYiu, SM=rp00207en_HK
dc.description.naturepublished_or_final_versionen_HK
dc.identifier.doi10.1109/SECURECOMM.2005.57en_HK
dc.identifier.scopuseid_2-s2.0-33847291930en_HK
dc.relation.referenceshttp://www.scopus.com/mlt/select.url?eid=2-s2.0-33847291930&selection=ref&src=s&origin=recordpageen_HK
dc.identifier.volume2005en_HK
dc.identifier.spage149en_HK
dc.identifier.epage156en_HK
dc.identifier.scopusauthoridDong, Y=23396799600en_HK
dc.identifier.scopusauthoridGo, HW=7004376831en_HK
dc.identifier.scopusauthoridSui, AF=6602768863en_HK
dc.identifier.scopusauthoridLi, VOK=7202621685en_HK
dc.identifier.scopusauthoridHui, LCK=8905728300en_HK
dc.identifier.scopusauthoridYiu, SM=7003282240en_HK

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats