Id-Based Aggregate Signature Scheme and Its Application in Authenticated Routing
نویسندگان
چکیده
An aggregate signature scheme can aggregate n signatures on n distinct messages from n distinct signers into a single signature. , . Thus n verification equations can be reduced to one So the aggregate signature adapts to Mobile Ad hoc Network (MANET). In this paper, we propose an efficient IDbased aggregate signature scheme with constant pairing computations. Compared with the existing IDbased aggregate signature schemes, this scheme greatly improves the efficiency of signature communication and verification. In addition, in this work, we apply our ID-based aggregate signature to authenticated routing protocol to present a secure routing scheme. Our scheme not only provides sound authentication and a secure routing protocol in ad hoc networks, but also meets the nature of MANET.
منابع مشابه
Efficient Aggregate Signature Algorithm and Its Application in MANET
An aggregate signature scheme can aggregate n signatures on n distinct messages from n distinct signers into a single signature. Thus, n verification equations can be reduced to one. So the aggregate signature adapts to Mobile Ad hoc Network (MANET). In this paper, we propose an efficient ID-based aggregate signature scheme with constant pairing computations. Compared with the existing ID-based...
متن کاملSecure Routing and Data Transmission in Mobile Ad Hoc Networks
In this paper, we present an identity (ID) based protocol that secures AODV and TCP so that it can be used in dynamic and attack prone environments of mobile ad hoc networks. The proposed protocol protects AODV using Sequential Aggregate Signatures (SAS) based on RSA. It also generates a session key for each pair of source-destination nodes of a MANET for securing the end-to-end transmitted dat...
متن کاملAggregate designated verifier signatures and application to secure routing
A designated verifier signature convinces only the specific recipient of the message of its integrity and origin. Following the notion of aggregate signature introduced by Boneh et al. in [3], we introduce in this work the notion of aggregate designated verifier signature. After defining the protocols and the security model for such schemes, we give a general construction which is based on mess...
متن کاملID-Based One Round Authenticated Tripartite Key Agreement Protocol with Pairings
With various applications of Weil pairing (Tate pairing) to cryptography, ID-based encryption schemes, digital signature schemes, blind signature scheme, two-party authenticated key agreement schemes, and tripartite key agreement scheme were proposed recently, all of them using bilinear pairing (Weil or Tate pairing). In this paper, we propose an ID-based one round authenticated tripartite key ...
متن کاملOnline/Offline Signatures and Multisignatures for AODV and DSR Routing Security
Efficient authentication is one of important security requirements in mobile ad hoc network (MANET) routing systems. The techniques of digital signatures are generally considered as the best candidates to achieve strong authentication. However, using normal digital signature schemes is too costly to MANET due to the computation overheads. Considering the feasibility of incorporating digital sig...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013