2008 International Conference on Networking, Architecture, and Storage 2008
DOI: 10.1109/nas.2008.60
|View full text |Cite
|
Sign up to set email alerts
|

Modelling Threshold Secret Sharing Schemes in Ad Hoc Networks

Abstract: A threshold secret sharing scheme divides a secret key into multiple shares. The secret key can be constructed based on a certain number of shares, if the number is bigger than the threshold. Threshold secret sharing schemes increase the availability of service in Ad Hoc networks and avoid the single point of failure. Consequently, many security mechanisms have been proposed based on threshold secret sharing. However, research about how to choose an appropriate threshold is still missing.In this paper, we use … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2009
2009
2011
2011

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…The multihop shareholder discovery is also considered in [5]. Even though the authors focus on the performance evaluation of TSS in MANETs in order to choose an appropriate threshold t, it is clear that the measurement of a service delay (i.e., a response time a requestor needs to wait before it receives enough replies) includes the replies that are received from local and multihop away shareholders.…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…The multihop shareholder discovery is also considered in [5]. Even though the authors focus on the performance evaluation of TSS in MANETs in order to choose an appropriate threshold t, it is clear that the measurement of a service delay (i.e., a response time a requestor needs to wait before it receives enough replies) includes the replies that are received from local and multihop away shareholders.…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…Threshold cryptography has been subject to many suggestions and modifications, amongst them were hierarchical schemes such as in [8], some threshold schemes that exploit redundancies in the partial signatures and use error correcting codes to mask incorrect partial signatures [9], anonymous and certificateless Public-Key Infrastructure (AC-PKI) to efficiently and securely provide public-key services without using public-key certificates as in [10], combination of two cryptographic techniques: ID based and threshold cryptography as in [11], and using Maximum Distance Separable codes and Symmetric Key Generation System (SKGS) to provide a practical cryptographic system capable of operating in a dynamic environment as in [12]. To evaluate the performance of a threshold secret sharing scheme in ad hoc networks,Fork/join queuing theory was used in [13] to develop a general model .…”
Section: ) Threshold Cryptographymentioning
confidence: 99%
“…The threshold level selection process is also influenced by various network dynamics such as network density, node speed, node transmission range, system stability, security level, link bandwidth and power loss. Suggestions for threshold level calculation were presented in [10], [13], and [14].…”
Section: ) Threshold Cryptographymentioning
confidence: 99%