Abstract
In this paper, we present an efficient proactive threshold RSA signature scheme for large-scale ad hoc networks. Our scheme has two advantages. Firstly, the building blocks of the whole scheme are proven secure. Secondly, the whole scheme is efficient.
Chapter PDF
Similar content being viewed by others
References
R. Ostrovsky and M. Yung. How to withstand mobile virus attacks. In Proc. 10th ACM Symposium on Principles of Distributed Computing (PODC), pages 51–59, 1991.
A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung. Proactive secret sharing or how to cope with perpetual leakage. In Advances in Cryptology CRYPTO’ 95 (D. Coppersmith, ed. Springer.). 963:339–352, 1995
Danny Dolev and H. Raymond Strong. Authenticated algorithms for byzantine agreement. SIAM J. Computing, 12(4), 1983.
Y. Frankel, P. Gemmell, P. D. MacKenzie, and M. Yung. Optimal-Resilience Proactive Public-Key Cryptosystems. In Foundations of Computer Science FOCS’97, pages 384–393, 1997.
Y. Frankel, P. Gemmell, P. D. MacKenzie, and M. Yung. Proactive RSA. In Proc. of Crypto’97, pages 440–454, 1997.
T. Rabin. A simplified approach to threshold and proactive RSA. in Proc. CRYPTO’ 98, pp. 89–104, Springer, 1998.
Haiyun Luo, Jiejun Kong, Petros Zerfos, Songwu Lu, and Lixia Zhang. URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks, IEEE/ACM Transactions on Networking (ToN), pp. 1049–1063, 12(6), 2004.
Stanislaw Jarecki, Nitesh Saxena, and Jeong Hyun Yi. Cryptanalyzing the Proactive RSA Signature Scheme in the URSA Ad Hoc Network Access Control Protocol. In ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), October 2004.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 International Federation for Information Processing
About this paper
Cite this paper
Zhang, R., Chen, K. (2006). An Efficient Proactive RSA Scheme for Large-Scale Ad Hoc Networks. In: Al Agha, K., Guérin Lassous, I., Pujolle, G. (eds) Challenges in Ad Hoc Networking. Med-Hoc-Net 2005. IFIP International Federation for Information Processing, vol 197. Springer, Boston, MA. https://doi.org/10.1007/0-387-31173-4_36
Download citation
DOI: https://doi.org/10.1007/0-387-31173-4_36
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-31171-5
Online ISBN: 978-0-387-31173-9
eBook Packages: Computer ScienceComputer Science (R0)