Please use this identifier to cite or link to this item: http://hdl.handle.net/10261/9877
Share/Export:
logo share SHARE logo core CORE BASE
Visualizar otros formatos: MARC | Dublin Core | RDF | ORE | MODS | METS | DIDL | DATACITE
Title

Cryptographic techniques for mobile ad-hoc networks

AuthorsDaza, Vanesa; Herranz, Javier; Morillo, Paz; Rafols, Carla
KeywordsMobile ad-hoc networks
Secret sharing techniques
Identity-based cryptography
Threshold cryptography
Issue Date26-Aug-2007
PublisherElsevier
CitationComputer Networks 51(18): 4938-4950 (2007)
AbstractIn this paper, we propose some cryptographic techniques to securely set up a mobile ad-hoc network. The process is fully self-managed by the nodes, without any trusted party. New nodes can join the network and are able to obtain the same capabilities as initial nodes; further, each node can obtain a pair of secret/public keys to secure and authenticate its communication. Two additional features of our system are that it allows to implement threshold operations (signature or decryption) involving subgroups of nodes in the network and that any subgroup with a small number of nodes (between 2 and 6) can obtain a common secret key without any communication after the set up phase.
Description13 pages.-- Printed version published on Dec 19, 2007.
Publisher version (URL)http://dx.doi.org/10.1016/j.comnet.2007.08.002
URIhttp://hdl.handle.net/10261/9877
DOI10.1016/j.comnet.2007.08.002
ISSN1389-1286
Appears in Collections:(IIIA) Artículos

Show full item record
Review this work

SCOPUSTM   
Citations

22
checked on Jan 14, 2022

WEB OF SCIENCETM
Citations

15
checked on Jan 21, 2022

Page view(s)

337
checked on Jan 25, 2022

Google ScholarTM

Check

Altmetric

Dimensions


WARNING: Items in Digital.CSIC are protected by copyright, with all rights reserved, unless otherwise indicated.