EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks

作者: Kyung-Ah Shim , Young-Ran Lee , Cheol-Min Park

DOI: 10.1016/J.ADHOC.2012.04.015

关键词:

摘要: … ID-based broadcast authentication scheme, EIBAS , to achieve security requirements in wireless sensor … , we use a pairing-optimal ID-based signature scheme with message recovery, …

参考文章(40)
David Galindo, Rodrigo Roman, Javier Lopez, A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks cryptology and network security. ,vol. 5339, pp. 120- 132 ,(2008) , 10.1007/978-3-540-89641-8_9
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar, Public key cryptography in sensor networks—revisited security of ad hoc and sensor networks. pp. 2- 18 ,(2004) , 10.1007/978-3-540-30496-8_2
P. Ning, D. Liu, Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks network and distributed system security symposium. ,(2002)
Piotr Szczechowiak, Leonardo B. Oliveira, Michael Scott, Martin Collier, Ricardo Dahab, NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks Lecture Notes in Computer Science. pp. 305- 320 ,(2008) , 10.1007/978-3-540-77690-1_19
Raylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto, Efficient ID-based digital signatures with message recovery cryptology and network security. pp. 47- 59 ,(2007) , 10.1007/978-3-540-76969-9_4
Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle, Sheueling Chang Shantz, Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs Lecture Notes in Computer Science. pp. 119- 132 ,(2004) , 10.1007/978-3-540-28632-5_9
Adi Shamir, Identity-based cryptosystems and signature schemes international cryptology conference. ,vol. 196, pp. 47- 53 ,(1985) , 10.1007/3-540-39568-7_5
Diego F. Aranha, Koray Karabina, Patrick Longa, Catherine H. Gebotys, Julio López, Faster explicit formulas for computing pairings over ordinary curves international cryptology conference. pp. 48- 68 ,(2011) , 10.1007/978-3-642-20465-4_5
Paul C. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems international cryptology conference. ,vol. 1109, pp. 104- 113 ,(1996) , 10.1007/3-540-68697-5_9