Certificate issuing using proxy and threshold signatures in self-initialized ad hoc network

Jeonil Kang, Dae Hun Nyang, Abedelaziz Mohaisen, Young Geun Choi, Koon Soon Kim

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

In ad hoc network, it is very crucial to issue certificates safely in the self-initialized scheme where the system authority exists only at the beginning of the network operation. In order to solve this problem, early studies have presented some suggestions by removing the system authority itself and using certificate chain, or by making nodes act as system authorities for issuing other nodes' certificates. In this paper, using proxy and threshold signatures, we introduce a certificate issuing scheme that can solve many problems in the previously proposed solutions. We demonstrate our scheme's performance through the simulation results. Also, we discuss the security value of our scheme's in various aspects.

Original languageEnglish
Title of host publicationComputational Science and Its Applications - ICCSA 2007 - International Conference, Proceedings
PublisherSpringer Verlag
Pages886-899
Number of pages14
EditionPART 3
ISBN (Print)9783540744825
DOIs
StatePublished - 2007
EventInternational Conference on Computational Science and its Applications, ICCSA 2007 - Kuala Lumpur, Malaysia
Duration: 26 Aug 200729 Aug 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberPART 3
Volume4707 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceInternational Conference on Computational Science and its Applications, ICCSA 2007
Country/TerritoryMalaysia
CityKuala Lumpur
Period26/08/0729/08/07

Fingerprint

Dive into the research topics of 'Certificate issuing using proxy and threshold signatures in self-initialized ad hoc network'. Together they form a unique fingerprint.

Cite this