A survey on peer-to-peer key management for mobile ad hoc networks

JVD Merwe, D Dawoud, S McDonald - ACM computing surveys (CSUR), 2007 - dl.acm.org
The article reviews the most popular peer-to-peer key management protocols for mobile ad
hoc networks (MANETs). The protocols are subdivided into groups based on their design …

A comprehensive survey of cryptography key management systems

S Rana, FK Parast, B Kelly, Y Wang, KB Kent - Journal of Information …, 2023 - Elsevier
Cryptographic methods have been extensively employed in various systems to address
security objectives, such as data confidentiality, authentication, and secure communication …

A threshold signature scheme for group communications without a shared distribution center

TY Chang, CC Yang, MS Hwang - Future Generation Computer Systems, 2004 - Elsevier
In this paper, we shall propose a (t, n) threshold signature with (k, l) threshold-shared
verification to be used in a group-oriented cryptosystem without a shared distribution center …

ChainKeeper: A cross‐chain scheme for governing the chain by chain

Y Xu, R He, S Dai, Y Zhang - IET Blockchain, 2023 - Wiley Online Library
With the rapid application of consortium chains, supervising these systems has become a
challenge for governments. The centralized model fails to deliver supervision services that …

[PDF][PDF] SM2 椭圆曲线门限密码算法

尚铭, 马原, 林璟锵, 荆继武 - 密码学报, 2014 - jcr.cacrnet.org.cn
在门限密码学中, 私钥信息被分享给独立的多个参与者, 每一次私钥计算都需要多个参与者同意,
从而提高算法安全性; 而且当少量参与者发生故障, 不可用时, 不影响私钥的可用性 …

Streaming spectral clustering

S Yoo, H Huang… - 2016 IEEE 32nd …, 2016 - ieeexplore.ieee.org
Clustering is a classical data mining task used for discovering interrelated pattern of
similarities in the data. In many modern day domains, data is getting continuously generated …

Providing distributed certificate authority service in cluster-based mobile ad hoc networks

Y Dong, AF Sui, SM Yiu, VOK Li, LCK Hui - Computer Communications, 2007 - Elsevier
Nodes in a mobile ad hoc network (MANET) are more vulnerable and there is no predefined
infrastructure in such a network. Providing secure communication in these networks is an …

Improvements of generalization of threshold signature and authenticated encryption for group communications

CL Hsu, TS Wu, TC Wu - Information Processing Letters, 2002 - Elsevier
Recently, Wang et al. proposed a (t, n) threshold signature scheme with (k, l) threshold
shared verification and a group-oriented authenticated encryption scheme with (k, l) …

Attacks on threshold signature schemes with traceable signers

YM Tseng, JK Jan - Information Processing Letters, 1999 - Elsevier
In 1998, Wang et al. proposed two new (t, n)-threshold signature schemes with traceable
signers that can withstand conspiracy attacks without attaching a secret number. However …

[PDF][PDF] 一个无可信中心的(狋, 狀) 门限签名方案的安全性分析

郭丽峰, 程相国 - 计算机学报, 2006 - cjc.ict.ac.cn
摘要一个(狋, 狀) 门限签名方案中, 任何狋个成员的集合能够对任意的消息产生签名而任何少于
狋个成员的集合都不能发行签名. 其中密钥通过可信中心或没有可信中心, 通过所有的成员运行 …