English   español  
Please use this identifier to cite or link to this item: http://hdl.handle.net/10261/9877
logo share SHARE logo core CORE   Add this article to your Mendeley library MendeleyBASE

Visualizar otros formatos: MARC | Dublin Core | RDF | ORE | MODS | METS | DIDL | DATACITE
Exportar a otros formatos:


Cryptographic techniques for mobile ad-hoc networks

AuthorsDaza, Vanesa; Herranz, Javier ; Morillo, Paz; Rafols, Carla
KeywordsMobile ad-hoc networks
Secret sharing techniques
Identity-based cryptography
Threshold cryptography
Issue Date26-Aug-2007
CitationComputer Networks 51(18): 4938-4950 (2007)
AbstractIn this paper, we propose some cryptographic techniques to securely set up a mobile ad-hoc network. The process is fully self-managed by the nodes, without any trusted party. New nodes can join the network and are able to obtain the same capabilities as initial nodes; further, each node can obtain a pair of secret/public keys to secure and authenticate its communication. Two additional features of our system are that it allows to implement threshold operations (signature or decryption) involving subgroups of nodes in the network and that any subgroup with a small number of nodes (between 2 and 6) can obtain a common secret key without any communication after the set up phase.
Description13 pages.-- Printed version published on Dec 19, 2007.
Publisher version (URL)http://dx.doi.org/10.1016/j.comnet.2007.08.002
Appears in Collections:(IIIA) Artículos
Files in This Item:
There are no files associated with this item.
Show full item record
Review this work

Related articles:

WARNING: Items in Digital.CSIC are protected by copyright, with all rights reserved, unless otherwise indicated.