An efficient identity-based secret key management scheme for MANETs

被引:0
|
作者
Zhang, Yong [1 ]
Qian, Hai-Feng [1 ]
机构
[1] Department of Computer Science and Technology, East China Normal University, Shanghai 200241, China
关键词
Mobile ad hoc networks;
D O I
10.1016/S1005-8885(11)60456-1
中图分类号
学科分类号
摘要
引用
收藏
页码:127 / 136
相关论文
共 50 条
  • [41] An Efficient Identity-Based Group Key Agreement Protocol
    Ping, Zeng
    Yong, Fang
    Yue, Liu
    Hu Ronglei
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2821 - 2825
  • [42] Efficient identity-based key encapsulation to multiple parties
    Barbosa, M
    Farshim, P
    CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2005, 3796 : 428 - 441
  • [43] Efficient Identity-Based Generalized Ring Signcryption Scheme
    Zhou, Caixue
    Cui, Zongmin
    Gao, Guangyong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (12): : 5553 - 5571
  • [44] Efficient identity-based and authenticated key agreement protocol
    Wang, Yongge
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 7420 : 172 - 197
  • [45] Secure and efficient identity-based threshold signcryption scheme
    Sun, Hua
    Zheng, Xue-Feng
    Yu, Yi-Ke
    Zhou, Fang
    Kongzhi yu Juece/Control and Decision, 2010, 25 (07): : 1031 - 1034
  • [46] An efficient and full secure identity-based encryption scheme
    Ma, Rong
    Cao, Zhen-Fu
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2010, 44 (03): : 389 - 392
  • [47] Efficient and Secure Identity-based Strong Key-Insulated Signature Scheme without Pairings
    Reddy, P. Vasudeva
    Babu, A. Ramesh
    Gayathri, N. B.
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (10) : 1211 - 1218
  • [48] Anonymous Identity-Based Key Scheme in Application of Privacy Protection
    Shen, Changjiang
    Yang, Lan
    Zhou, Chuansheng
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON EDUCATION, SPORTS, ARTS AND MANAGEMENT ENGINEERING (ICESAME 2017), 2017, 123 : 1529 - 1535
  • [49] Identity-Based Chameleon Hash Scheme without Key Exposure
    Chen, Xiaofeng
    Zhang, Fangguo
    Susilo, Willy
    Tian, Haibo
    Li, Jin
    Kim, Kwangjo
    INFORMATION SECURITY AND PRIVACY, 2010, 6168 : 200 - +
  • [50] Private Key Management in Hierarchical Identity-Based Encryption
    Liu, Zhongren
    Xu, Li
    Chen, Zhide
    Guo, Fuchun
    SITIS 2007: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL IMAGE TECHNOLOGIES & INTERNET BASED SYSTEMS, 2008, : 206 - 212