A survey of applications of identity-based cryptography in mobile ad-hoc networks
Security in mobile ad-hoc networks (MANETs) continues to attract attention after years of
research. Recent advances in identity-based cryptography (IBC) sheds light on this problem …
research. Recent advances in identity-based cryptography (IBC) sheds light on this problem …
Efficient non-interactive proof systems for bilinear groups
Non-interactive zero-knowledge proofs and non-interactive witness-indistinguishable proofs
have played a significant role in the theory of cryptography. However, lack of efficiency has …
have played a significant role in the theory of cryptography. However, lack of efficiency has …
A verifiable random function with short proofs and keys
Y Dodis, A Yampolskiy - International Workshop on Public Key …, 2005 - Springer
We give a simple and efficient construction of a verifiable random function (VRF) on bilinear
groups. Our construction is direct. In contrast to prior VRF constructions [14, 15], it avoids …
groups. Our construction is direct. In contrast to prior VRF constructions [14, 15], it avoids …
TACKing together efficient authentication, revocation, and privacy in VANETs
Vehicular ad hoc networks (VANETs) require a mechanism to help authenticate messages,
identify valid vehicles, and remove malevolent vehicles. A public key infrastructure (PKI) can …
identify valid vehicles, and remove malevolent vehicles. A public key infrastructure (PKI) can …
[图书][B] RFID and sensor networks: architectures, protocols, security, and integrations
RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations is the
authoritative reference on RFID and WSNs. Covering a broad range of topics that includes …
authoritative reference on RFID and WSNs. Covering a broad range of topics that includes …
Efficient noninteractive proof systems for bilinear groups
Noninteractive zero-knowledge proofs and noninteractive witness-indistinguishable proofs
have played a significant role in the theory of cryptography. However, lack of efficiency has …
have played a significant role in the theory of cryptography. However, lack of efficiency has …
The strobe algorithms for multi-source warehouse consistency
Y Zhuge, H Garcia-Molina… - … Conference on Parallel …, 1996 - ieeexplore.ieee.org
A warehouse is a data repository containing integrated information for efficient querying and
analysis. Maintaining the consistency of warehouse data is challenging, especially if the …
analysis. Maintaining the consistency of warehouse data is challenging, especially if the …
Why and how zk-snark works
M Petkus - arXiv preprint arXiv:1906.07221, 2019 - arxiv.org
Despite the existence of multiple great resources on zk-SNARK construction, from original
papers to explainers, due to the sheer number of moving parts the subject remains a black …
papers to explainers, due to the sheer number of moving parts the subject remains a black …
Certificateless authenticated two-party key agreement protocols
TK Mandt, CH Tan - Advances in Computer Science-ASIAN 2006. Secure …, 2007 - Springer
In their seminal paper on certificateless public key cryptography, Al-Riyami and Paterson
(AP) proposed a certificateless authenticated key agreement protocol. Key agreement …
(AP) proposed a certificateless authenticated key agreement protocol. Key agreement …
Aggregated path authentication for efficient BGP security
The Border Gateway Protocol (BGP) controls inter-domain routing in the Internet. BGP is
vulnerable to many attacks, since routers rely on hearsay information from neighbors …
vulnerable to many attacks, since routers rely on hearsay information from neighbors …