File Download
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/SECURECOMM.2005.57
- Scopus: eid_2-s2.0-33847291930
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Providing distributed certificate authority service in mobile ad hoc networks
Title | Providing distributed certificate authority service in mobile ad hoc networks |
---|---|
Authors | |
Keywords | Cluster-based architecture Distributed CA services Mobile ad hoc network PKI Proactive update Threshold secret sharing |
Issue Date | 2005 |
Publisher | IEEE, Computer Society. |
Citation | Proceedings - First International Conference On Security And Privacy For Emerging Areas In Communications Networks, Securecomm 2005, 2005, v. 2005, p. 149-156 How to Cite? |
Abstract | In this paper, we propose an architecture for providing distributed Certificate Authority (CA) service in Mobile Ad Hoc Networks (MANET), based on threshold cryptography. We have two major contributions: 1) we make use of the cluster structure to provide CA service, and design a scheme for locating CA server nodes in MANET; 2) we provide a proactive secret share update protocol, which periodically updates CA secret shares with low system overhead. Compared with existing approaches, our CA architecture provides faster CA services to user nodes at reduced system overhead. © 2005 IEEE. |
Persistent Identifier | http://hdl.handle.net/10722/45868 |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Dong, Y | en_HK |
dc.contributor.author | Go, HW | en_HK |
dc.contributor.author | Sui, AF | en_HK |
dc.contributor.author | Li, VOK | en_HK |
dc.contributor.author | Hui, LCK | en_HK |
dc.contributor.author | Yiu, SM | en_HK |
dc.date.accessioned | 2007-10-30T06:37:20Z | - |
dc.date.available | 2007-10-30T06:37:20Z | - |
dc.date.issued | 2005 | en_HK |
dc.identifier.citation | Proceedings - First International Conference On Security And Privacy For Emerging Areas In Communications Networks, Securecomm 2005, 2005, v. 2005, p. 149-156 | en_HK |
dc.identifier.uri | http://hdl.handle.net/10722/45868 | - |
dc.description.abstract | In this paper, we propose an architecture for providing distributed Certificate Authority (CA) service in Mobile Ad Hoc Networks (MANET), based on threshold cryptography. We have two major contributions: 1) we make use of the cluster structure to provide CA service, and design a scheme for locating CA server nodes in MANET; 2) we provide a proactive secret share update protocol, which periodically updates CA secret shares with low system overhead. Compared with existing approaches, our CA architecture provides faster CA services to user nodes at reduced system overhead. © 2005 IEEE. | en_HK |
dc.format.extent | 258575 bytes | - |
dc.format.extent | 4152649 bytes | - |
dc.format.extent | 2781 bytes | - |
dc.format.extent | 3502 bytes | - |
dc.format.extent | 23319 bytes | - |
dc.format.mimetype | application/pdf | - |
dc.format.mimetype | application/pdf | - |
dc.format.mimetype | text/plain | - |
dc.format.mimetype | text/plain | - |
dc.format.mimetype | text/plain | - |
dc.language | eng | en_HK |
dc.publisher | IEEE, Computer Society. | en_HK |
dc.relation.ispartof | Proceedings - First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005 | en_HK |
dc.rights | ©2005 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. | - |
dc.subject | Cluster-based architecture | en_HK |
dc.subject | Distributed CA services | en_HK |
dc.subject | Mobile ad hoc network | en_HK |
dc.subject | PKI | en_HK |
dc.subject | Proactive update | en_HK |
dc.subject | Threshold secret sharing | en_HK |
dc.title | Providing distributed certificate authority service in mobile ad hoc networks | en_HK |
dc.type | Conference_Paper | en_HK |
dc.identifier.email | Li, VOK:vli@eee.hku.hk | en_HK |
dc.identifier.email | Hui, LCK:hui@cs.hku.hk | en_HK |
dc.identifier.email | Yiu, SM:smyiu@cs.hku.hk | en_HK |
dc.identifier.authority | Li, VOK=rp00150 | en_HK |
dc.identifier.authority | Hui, LCK=rp00120 | en_HK |
dc.identifier.authority | Yiu, SM=rp00207 | en_HK |
dc.description.nature | published_or_final_version | en_HK |
dc.identifier.doi | 10.1109/SECURECOMM.2005.57 | en_HK |
dc.identifier.scopus | eid_2-s2.0-33847291930 | en_HK |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-33847291930&selection=ref&src=s&origin=recordpage | en_HK |
dc.identifier.volume | 2005 | en_HK |
dc.identifier.spage | 149 | en_HK |
dc.identifier.epage | 156 | en_HK |
dc.identifier.scopusauthorid | Dong, Y=23396799600 | en_HK |
dc.identifier.scopusauthorid | Go, HW=7004376831 | en_HK |
dc.identifier.scopusauthorid | Sui, AF=6602768863 | en_HK |
dc.identifier.scopusauthorid | Li, VOK=7202621685 | en_HK |
dc.identifier.scopusauthorid | Hui, LCK=8905728300 | en_HK |
dc.identifier.scopusauthorid | Yiu, SM=7003282240 | en_HK |