File Download
There are no files associated with this item.
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Applying forward security and threshold cryptography in ad hoc networks
Title | Applying forward security and threshold cryptography in ad hoc networks |
---|---|
Authors | |
Keywords | Forward security Mobile ad hoc network (MANET) Threshold cryptography |
Issue Date | 2004 |
Publisher | ICWN. |
Citation | Proceedings Of The International Conference On Wireless Networks, Icwn'04, 2004, v. 1, p. 202-205 How to Cite? |
Abstract | Public Key Infrastructure (PKI) provides a framework for different parties to communicate securely. However, in mobile ad hoc networks(MANETs), the mobility and vulnerability of nodes make the application of PKI more difficult. For example, if there is only a single Certificate Authority(CA), this CA may not be accessible to some nodes. To handle this availability problem and to enhance the security of MANETs, many different ideas have been proposed. However, none of the previous work has discussed these ideas in details. In this paper, we discuss how forward security technology, threshold and proactive secret sharing techniques together with the concept of distributed CAs can be applied to MANETs. We also study the feasibility of applying existing forward-secure threshold schemes in MANETs. We find that these schemes may be inefficient in terms of communication overhead. We believe that a communication-efficient forward-secure threshold scheme is an important future research direction. |
Persistent Identifier | http://hdl.handle.net/10722/93263 |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Go, HW | en_HK |
dc.contributor.author | Dong, Y | en_HK |
dc.contributor.author | Hui, LCK | en_HK |
dc.contributor.author | Yiu, SM | en_HK |
dc.contributor.author | Li, VOK | en_HK |
dc.date.accessioned | 2010-09-25T14:55:49Z | - |
dc.date.available | 2010-09-25T14:55:49Z | - |
dc.date.issued | 2004 | en_HK |
dc.identifier.citation | Proceedings Of The International Conference On Wireless Networks, Icwn'04, 2004, v. 1, p. 202-205 | en_HK |
dc.identifier.uri | http://hdl.handle.net/10722/93263 | - |
dc.description.abstract | Public Key Infrastructure (PKI) provides a framework for different parties to communicate securely. However, in mobile ad hoc networks(MANETs), the mobility and vulnerability of nodes make the application of PKI more difficult. For example, if there is only a single Certificate Authority(CA), this CA may not be accessible to some nodes. To handle this availability problem and to enhance the security of MANETs, many different ideas have been proposed. However, none of the previous work has discussed these ideas in details. In this paper, we discuss how forward security technology, threshold and proactive secret sharing techniques together with the concept of distributed CAs can be applied to MANETs. We also study the feasibility of applying existing forward-secure threshold schemes in MANETs. We find that these schemes may be inefficient in terms of communication overhead. We believe that a communication-efficient forward-secure threshold scheme is an important future research direction. | en_HK |
dc.language | eng | en_HK |
dc.publisher | ICWN. | en_HK |
dc.relation.ispartof | Proceedings of the International Conference on Wireless Networks, ICWN'04 | en_HK |
dc.subject | Forward security | en_HK |
dc.subject | Mobile ad hoc network (MANET) | en_HK |
dc.subject | Threshold cryptography | en_HK |
dc.title | Applying forward security and threshold cryptography in ad hoc networks | en_HK |
dc.type | Conference_Paper | en_HK |
dc.identifier.email | Hui, LCK:hui@cs.hku.hk | en_HK |
dc.identifier.email | Yiu, SM:smyiu@cs.hku.hk | en_HK |
dc.identifier.email | Li, VOK:vli@eee.hku.hk | en_HK |
dc.identifier.authority | Hui, LCK=rp00120 | en_HK |
dc.identifier.authority | Yiu, SM=rp00207 | en_HK |
dc.identifier.authority | Li, VOK=rp00150 | en_HK |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.scopus | eid_2-s2.0-12744254719 | en_HK |
dc.identifier.hkuros | 92296 | en_HK |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-12744254719&selection=ref&src=s&origin=recordpage | en_HK |
dc.identifier.volume | 1 | en_HK |
dc.identifier.spage | 202 | en_HK |
dc.identifier.epage | 205 | en_HK |
dc.identifier.scopusauthorid | Go, HW=7004376831 | en_HK |
dc.identifier.scopusauthorid | Dong, Y=23396799600 | en_HK |
dc.identifier.scopusauthorid | Hui, LCK=8905728300 | en_HK |
dc.identifier.scopusauthorid | Yiu, SM=7003282240 | en_HK |
dc.identifier.scopusauthorid | Li, VOK=7202621685 | en_HK |