2008
DOI: 10.1007/978-3-540-88313-5_4
|View full text |Cite
|
Sign up to set email alerts
|

Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs

Abstract: Key agreement is a fundamental security functionality by which pairs of nodes agree on shared keys to be used for protecting their pairwise communications. In this work we study key-agreement schemes that are well-suited for the mobile network environment. Specifically, we describe schemes with the following characteristics:• Non-interactive: any two nodes can compute a unique shared secret key without interaction;• Identity-based: to compute the shared secret key, each node only needs its own secret key and t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
40
0
7

Year Published

2008
2008
2020
2020

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 36 publications
(47 citation statements)
references
References 14 publications
0
40
0
7
Order By: Relevance
“…Moreover, their schemes do not scale well to large numbers of levels. The same criticisms apply to earlier schemes [2,21] on which the scheme of Gennaro et al [14] is based. Indeed, one of the open problems left in [14] is to construct a H-ID-NIKE scheme with security against not only compromise of any number of leaves, but also against any number of nodes at higher levels of the hierarchy.…”
Section: Applicationsmentioning
confidence: 86%
See 4 more Smart Citations
“…Moreover, their schemes do not scale well to large numbers of levels. The same criticisms apply to earlier schemes [2,21] on which the scheme of Gennaro et al [14] is based. Indeed, one of the open problems left in [14] is to construct a H-ID-NIKE scheme with security against not only compromise of any number of leaves, but also against any number of nodes at higher levels of the hierarchy.…”
Section: Applicationsmentioning
confidence: 86%
“…The same criticisms apply to earlier schemes [2,21] on which the scheme of Gennaro et al [14] is based. Indeed, one of the open problems left in [14] is to construct a H-ID-NIKE scheme with security against not only compromise of any number of leaves, but also against any number of nodes at higher levels of the hierarchy. 5 By substituting the random oracles in the SOK scheme [23] with our new PHFs, we obtain the first secure ID-NIKE schemes in the standard model.…”
Section: Applicationsmentioning
confidence: 86%
See 3 more Smart Citations