An efficient identity-based secret key management scheme for MANETs

被引:0
|
作者
Zhang, Yong [1 ]
Qian, Hai-Feng [1 ]
机构
[1] Department of Computer Science and Technology, East China Normal University, Shanghai 200241, China
关键词
Mobile ad hoc networks;
D O I
10.1016/S1005-8885(11)60456-1
中图分类号
学科分类号
摘要
引用
收藏
页码:127 / 136
相关论文
共 50 条
  • [21] A new identity-based conference key distribution scheme
    Xu, SB
    van Tilborg, H
    2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 269 - 269
  • [22] A Practical Key Issuing Scheme in Identity-based Cryptosystem
    Wang, Changji
    Liu, Jing
    2008 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL 1, PROCEEDINGS, 2008, : 454 - 457
  • [23] Identity-based key-insulated signcryption scheme
    Wang, Huige
    Cao, Hao
    Li, Desheng
    Journal of Computational Information Systems, 2013, 9 (08): : 3067 - 3075
  • [24] Identity-based cryptography in public key management
    Yum, DH
    Lee, PJ
    PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2004, 3093 : 71 - 84
  • [25] Identity-based key management for cloud computing
    Zhu, Hong
    Mei, Zhuolin
    Xie, Meiyi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 2143 - 2156
  • [26] Efficient Identity-Based Key Management for Configurable Hierarchical Cloud Computing Environment
    Huang, Jyun-Yao
    Liao, I-En
    Chiang, Chen-Kang
    2011 IEEE 17TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2011, : 883 - 887
  • [27] A Key Management Scheme Based on Key Hypergraph and Identity-based Cryptography in Multi-domain Optical Networks
    Wu Q.
    Wen W.
    1600, Sichuan University (49): : 85 - 92
  • [28] Identity-Based Inner Product Functional Encryption with Verified Secret Key
    Deng Y.-Q.
    Song G.
    Yang B.
    Peng C.-G.
    Tang C.-M.
    Wen Y.-M.
    Jisuanji Xuebao/Chinese Journal of Computers, 2021, 44 (01): : 209 - 221
  • [29] An efficient identity-based signature scheme with provable security
    Yi, Peng
    Li, Jiguo
    Liu, Chengdong
    Han, Jinguang
    Wang, Huaqun
    Zhang, Yichen
    Chen, Yu
    INFORMATION SCIENCES, 2021, 576 : 790 - 799
  • [30] An Efficient Identity-Based Deniable Authenticated Encryption Scheme
    Wu, Weifeng
    Li, Fagen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (05): : 1904 - 1919