A survey of applications of identity-based cryptography in mobile ad-hoc networks

S Zhao, A Aggarwal, R Frost… - … Communications surveys & …, 2011 - ieeexplore.ieee.org
Security in mobile ad-hoc networks (MANETs) continues to attract attention after years of
research. Recent advances in identity-based cryptography (IBC) sheds light on this problem …

Efficient non-interactive proof systems for bilinear groups

J Groth, A Sahai - Advances in Cryptology–EUROCRYPT 2008: 27th …, 2008 - Springer
Non-interactive zero-knowledge proofs and non-interactive witness-indistinguishable proofs
have played a significant role in the theory of cryptography. However, lack of efficiency has …

A verifiable random function with short proofs and keys

Y Dodis, A Yampolskiy - International Workshop on Public Key …, 2005 - Springer
We give a simple and efficient construction of a verifiable random function (VRF) on bilinear
groups. Our construction is direct. In contrast to prior VRF constructions [14, 15], it avoids …

TACKing together efficient authentication, revocation, and privacy in VANETs

A Studer, E Shi, F Bai, A Perrig - … on Sensor, Mesh and Ad Hoc …, 2009 - ieeexplore.ieee.org
Vehicular ad hoc networks (VANETs) require a mechanism to help authenticate messages,
identify valid vehicles, and remove malevolent vehicles. A public key infrastructure (PKI) can …

[图书][B] RFID and sensor networks: architectures, protocols, security, and integrations

Y Zhang, LT Yang, J Chen - 2009 - books.google.com
RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations is the
authoritative reference on RFID and WSNs. Covering a broad range of topics that includes …

Efficient noninteractive proof systems for bilinear groups

J Groth, A Sahai - SIAM Journal on Computing, 2012 - SIAM
Noninteractive zero-knowledge proofs and noninteractive witness-indistinguishable proofs
have played a significant role in the theory of cryptography. However, lack of efficiency has …

The strobe algorithms for multi-source warehouse consistency

Y Zhuge, H Garcia-Molina… - … Conference on Parallel …, 1996 - ieeexplore.ieee.org
A warehouse is a data repository containing integrated information for efficient querying and
analysis. Maintaining the consistency of warehouse data is challenging, especially if the …

Why and how zk-snark works

M Petkus - arXiv preprint arXiv:1906.07221, 2019 - arxiv.org
Despite the existence of multiple great resources on zk-SNARK construction, from original
papers to explainers, due to the sheer number of moving parts the subject remains a black …

Certificateless authenticated two-party key agreement protocols

TK Mandt, CH Tan - Advances in Computer Science-ASIAN 2006. Secure …, 2007 - Springer
In their seminal paper on certificateless public key cryptography, Al-Riyami and Paterson
(AP) proposed a certificateless authenticated key agreement protocol. Key agreement …

Aggregated path authentication for efficient BGP security

M Zhao, SW Smith, DM Nicol - Proceedings of the 12th ACM conference …, 2005 - dl.acm.org
The Border Gateway Protocol (BGP) controls inter-domain routing in the Internet. BGP is
vulnerable to many attacks, since routers rely on hearsay information from neighbors …