

Novel Multicast Key Authentication Protocol
Abstract
Keywords
References
C. Asmuth and J. Bloom. A modular approach to key safeguarding. Information Theory, IEEE Transactions on, 29(2):208 – 210, mar 1983.
Adi Shamir. How to share a secret. Commun. ACM, 22:612–613, November 1979.
Sorin Iftene. Secret sharing schemes with applications in security protocols. Sci. Ann. Cuza Univ., 16:63–96, 2006.
Li Qiong, Wang Zhifang, Niu Xiamu, and Sun Shenghe. A noninteractive modular verifiable secret sharing scheme. In Communications,Circuits and Systems, 2005. Proceedings. 2005 International Conference on, volume 1, pages 84 – 87 Vol. 1, may 2005.
L. Harn and C. Lin. Detection and identification of cheaters in (t, n) secret sharing scheme. Designs, Codes and Cryptography, 52(1):15–24, 2009.
K. Kaya and A. Selc¸uk. A verifiable secret sharing scheme based on the chinese remainder theorem. Progress in Cryptology-INDOCRYPT 2008, pages 414–425, 2008.
Lidong Zhou and Z.J. Haas. Securing ad hoc networks. Network, IEEE, 13(6):24 –30, nov/dec 1999.
Cohen Benaloh. Secret sharing homomorphisms: Keeping shares of a secret secret (extended abstract). In CRYPTO: Proceedings of Crypto, 1986.
L. Ertaul and N. Chavan. Security of ad hoc networks and threshold cryptography. In Wireless networks, Communications and Mobile Computing, 2005 International Conference on, volume 1, pages 69–74. IEEE, 2005.
Xiong Yan, Miao Fuyou, Zhang Weichao, and WANG Xingfu. Distributed authentication based on multi-hop signing with encrypted signature functions in mobile ad hoc networks. Acta Electronica Sinica, Dependable Sec. Comput, 7(2):189–202, 2010.
T. Sander and C. Tschudin. Protecting mobile agents against malicious hosts. Mobile agents and security, pages 44–60, 1998.
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust threshold dss signatures. In Advances in CryptologyłEUROCRYPT96, pages 354–371. Springer, 1996.
J.H. Park, E.Y. Park, S.J. Moon, D.H. Choi, Y.S. Kang, and J.C. Ha. Fault resistant crt-rsa scheme adopting a small exponent. In Computer Sciences and Convergence Information Technology (ICCIT), 2010 5th International Conference on, pages 544–549. IEEE, 2010.
Ernie Brickell, Jan Camenisch, and Liqun Chen. Direct anonymous attestation. In Proceedings of the 11th ACM conference on Computer and communications security, CCS ’04, pages 132–145, New York, NY, USA, 2004. ACM.
Liqun Chen, Hans L¨ohr, Mark Manulis, and Ahmad-Reza Sadeghi. Property-based attestation without a trusted third party. In Tzong-Chen Wu, Chin-Laung Lei, Vincent Rijmen, and Der-Tsai Lee, editors, ISC, volume 5222 of Lecture Notes in Computer Science, pages 31–46. Springer, 2008.
Yanjiang Yang, Yingjiu Li, Robert H. Deng, and Feng Bao. Shifting inference control to user side: Architecture and protocol. IEEE Trans.
Wenchao Huang, Yan Xiong, and Depin Chen. Daaodv: A secure adhoc routing protocol based on direct anonymous attestation. In Proc.
Int. Conf. Computational Science and Engineering CSE ’09, volume 2, pages 809–816, 2009.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.