2004
DOI: 10.1007/978-3-540-25980-0_19
|View full text |Cite
|
Sign up to set email alerts
|

Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography

Abstract: Abstract. The implementation of a standard PKI in a mobile ad hoc network (MANET) is not practical for several reasons: (1) lack of a fixed infrastructure; (2) a centralized certification authority (CA) represents a single point of failure in the network; (3) the relative locations and logical assignments of nodes vary in time; (4) nodes often have limited transmission and computational power, storage, and battery life. We propose a practical distributed CA-based PKI scheme for MANETs based on Elliptic Curve C… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2005
2005
2018
2018

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(13 citation statements)
references
References 15 publications
0
13
0
Order By: Relevance
“…The Rabin cryptosystem can be adopted into our proposed scheme because a user should perform only one modular multiplication and some inexpensive operations, such as a hash function, per mutual authentication. In general, a smart card performs up to 3000 modular multiplications per second [24]. Although it is necessary for the server to perform expensive operations in our scheme, it may cause an insignificant decrease in overall system performance because it is assumed that a server is able to maintain sufficient performance.…”
Section: Discussionmentioning
confidence: 99%
“…The Rabin cryptosystem can be adopted into our proposed scheme because a user should perform only one modular multiplication and some inexpensive operations, such as a hash function, per mutual authentication. In general, a smart card performs up to 3000 modular multiplications per second [24]. Although it is necessary for the server to perform expensive operations in our scheme, it may cause an insignificant decrease in overall system performance because it is assumed that a server is able to maintain sufficient performance.…”
Section: Discussionmentioning
confidence: 99%
“…Different from the traditional certificate, the IC is composed of an identity element (still expressed as I) and reconfigurable key data (also expressed as P). P can reconstruct the public key of the identity entity together with the public key of the certificate authority (CA) [13]. Then, the IC could be expressed as a two-tuple (identity element and reconstructed key data) such as (I, P).…”
Section: Implicit Certificate and Related Workmentioning
confidence: 99%
“…Zouridaki et al [11] designed an elliptic curve-based DCA system. Elliptic curve is used because of its shorter key length and lower computational overhead.…”
Section: Cluster-based Dcamentioning
confidence: 99%