2010
DOI: 10.1002/sec.279
|View full text |Cite
|
Sign up to set email alerts
|

Generating certification authority authenticated public keys in ad hoc networks

Abstract: In an ad hoc network, nodes may face the need to generate new public keys. To be verifiably authentic, these newly generated public keys need to be certified. However, because of the absence of a permanent communication infrastructure, a certification authority (CA) that can issue certificates may not always be reachable. The downside is that secure communication channels cannot be established. Previously proposed solutions do not guarantee that identities contained in certificates are valid or, when they do, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 28 publications
(36 reference statements)
0
4
0
Order By: Relevance
“…An important element of such systems is preventing either the buyer or seller from repudiating a transaction. Historically, these systems have relied on TA-based [6], [7], [8] and certificatebased [9], [10], [11], [12] methods to ensure nonrepudiation. In the TA-based nonrepudiation protocols, a buyer and a seller allow a TA to store information about the multimedia transactions.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…An important element of such systems is preventing either the buyer or seller from repudiating a transaction. Historically, these systems have relied on TA-based [6], [7], [8] and certificatebased [9], [10], [11], [12] methods to ensure nonrepudiation. In the TA-based nonrepudiation protocols, a buyer and a seller allow a TA to store information about the multimedia transactions.…”
Section: Related Workmentioning
confidence: 99%
“…In this section, we describe two security schemes that solve these two important problems. They are a certificateless signature scheme [13] and Kounga et al's scheme [11], [12].…”
Section: Background and Preliminarymentioning
confidence: 99%
See 1 more Smart Citation
“…Since the first one was proposed by Lamport, a great number of authentication schemes have been presented, which provide authorized communication between remote entities [ 4 9 ]. According to the evidences adopted in the authentication, the existing schemes are divided into two categories: certificate-based and identity-based [ 10 16 ]. The former category requires the high computation cost and large storage space for the management of certificate store.…”
Section: Introductionmentioning
confidence: 99%