Loading...
Loading...

Go to the content (press return)

Cryptographic techniques for mobile ad-hoc networks

Author
Daza, V.; Herranz, J.; Morillo, M.; Rafols, C.
Type of activity
Journal article
Journal
Computer networks
Date of publication
2007-12
Volume
51
Number
18
First page
4938
Last page
4950
DOI
https://doi.org/10.1016/j.comnet.2007.08.002 Open in new window
URL
http://www.sciencedirect.com/science/article/pii/S1389128607002253 Open in new window
Abstract
In this paper, we propose some cryptographic techniques to securely set up a mobile ad-hoc network. The process is fully self-managed by the nodes, without any trusted party. New nodes can join the network and are able to obtain the same capabilities as initial nodes; further, each node can obtain a pair of secret/public keys to secure and authenticate its communication. Two additional features of our system are that it allows to implement threshold operations (signature or decryption) involving...
Keywords
Mobile ad-hoc networksSecret sharing techniquesIdentity-based cryptographyThreshold cryptography
Group of research
MAK - Mathematics Applied to Cryptography

Participants