Anonymous authentication scheme based on identity-based proxy group signature for wireless mesh network

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anonymous authentication scheme based on identity-based proxy group signature for wireless mesh network

Access security is the key obstacle of the rapid popularization of wireless mesh network (WMN). We suggest the proxy group signature scheme based on identity in this paper. This scheme is combined with proxy group signature and identity-based group signature, based on designated hierarchical proxy architecture for WMN. An anonymous mutual authentication scheme is thus achieved, which not only s...

متن کامل

A Proxy Signature Based Re-authentication Scheme for Secure Fast Handoff in Wireless Mesh Networks

In wireless mesh networks (WMNs), re-authentication guarantees the secure association between a roaming mesh host (MH) and a target mesh access point (MAP) in handoff process. However, due to the complex security mechanisms in re-authentication procedure, handoff delay is significantly extended, making it harder to guarantee the quality of service (QoS) of some mesh applications. In this paper,...

متن کامل

A new identity based proxy signature scheme

A new identity based proxy signature scheme Bin Wang Information Engineering College of Yangzhou University Yangzhou City, Jiangsu Province, P.R.China Tel: 086-0514-82220820 E-mail:[email protected] Abstract: Proxy signature schemes allow a proxy signer to generate proxy signatures on behalf of an original signer. Mambo et al. first introduced the notion of proxy signature and a lot of researc...

متن کامل

Identity Based Threshold Proxy Signature

Identity-based (ID-based) public key cryptosystem can be a good alternative for certificate-based public key setting, especially when efficient key management and moderate security are required. In a (t, n) threshold proxy signature scheme, the original signer delegates the power of signing messages to a designated proxy group of n members. Any t or more proxy signers of the group can cooperati...

متن کامل

A short identity-based proxy ring signature scheme from RSA

Identity-based proxy ring signature concept was introduced by Cheng et al. in 2004. This primitive is useful where the privacy of proxy signers is required. In this paper, the first short provably secure identity-based proxy ring signature scheme from RSA assumption has been proposed. In addition, the security of the proposed scheme tightly reduces to the RSA assumption, and therefore, the prop...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: EURASIP Journal on Wireless Communications and Networking

سال: 2016

ISSN: 1687-1499

DOI: 10.1186/s13638-016-0685-2