A self-healing key distribution scheme based on vector space secret sharing and one way hash chains
An efficient self-healing key distribution scheme with revocation capability is proposed for secure group communication in wireless networks. The scheme bases on vector space secret sharing and one way hash function techniques. Vector space secret sharing helps to realize general monotone decreasing...
| Main Authors: | Tian, Biming, Han, Song, Dillon, Tharam S., Das, S. |
|---|---|
| Other Authors: | Ramesh Jain |
| Format: | Conference Paper |
| Published: |
Institute of Electrical and Electronics Engineers (IEEE)
2008
|
| Online Access: | http://hdl.handle.net/20.500.11937/37405 |
Similar Items
A key management scheme for heterogeneous sensor networks using keyed-hash chain
by: Tian, Biming, et al.
Published: (2009)
by: Tian, Biming, et al.
Published: (2009)
An efficient self-healing key distribution scheme
by: Tian, Biming, et al.
Published: (2008)
by: Tian, Biming, et al.
Published: (2008)
A self-healing and mutual-healing key distribution scheme using bilinear pairings for wireless networks
by: Tian, Biming, et al.
Published: (2008)
by: Tian, Biming, et al.
Published: (2008)
A mutual-healing key distribution scheme in wireless sensor networks
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
Generalized hash-binary-tree based self-healing key distribution with implicit authentication
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
An authenticated self-healing key distribution scheme based on bilinear pairings
by: Tian, Biming, et al.
Published: (2009)
by: Tian, Biming, et al.
Published: (2009)
Self-Healing Key Distribution Schemes for Wireless Networks: A Survey
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
Secure web services using two-way authentication and three-party key establishment for service delivery
by: Han, Song, et al.
Published: (2009)
by: Han, Song, et al.
Published: (2009)
Secret sharing scheme for key management of secure data sharing in cloud
by: Abd Majid, Noorhafezan
Published: (2019)
by: Abd Majid, Noorhafezan
Published: (2019)
Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks
by: Han, Song, et al.
Published: (2009)
by: Han, Song, et al.
Published: (2009)
A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks
by: Tian, Biming, et al.
Published: (2010)
by: Tian, Biming, et al.
Published: (2010)
Blakely’s secret sharing scheme
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Pairing-based public-key encryption schemes with backward-and-forward security
by: Han, Song, et al.
Published: (2008)
by: Han, Song, et al.
Published: (2008)
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008)
by: Syamsuddin, I, et al.
Published: (2008)
A method of sharing a secret key in quantum key distribution
by: Wan Adnan, Wan Azizun, et al.
Published: (2010)
by: Wan Adnan, Wan Azizun, et al.
Published: (2010)
Constructing secret sharing schemes based on cyclic
by: Hoo, Mei Hui
Published: (2014)
by: Hoo, Mei Hui
Published: (2014)
Secret sharing scheme for collaborative access system
by: Kadir, Rashidah, et al.
Published: (2000)
by: Kadir, Rashidah, et al.
Published: (2000)
Hash-Tree Anti-Tampering Schemes
by: Moss, Ben, et al.
Published: (2002)
by: Moss, Ben, et al.
Published: (2002)
Key management for wireless sensor network security
by: Tian, Biming
Published: (2011)
by: Tian, Biming
Published: (2011)
Perfect secret sharing scheme based on vertex domination set
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2015)
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2015)
A study on one way hashing function and its application for
FTMSK webmail / Noor Hasimah Ibrahim Teo
by: Ibrahim Teo, Noor Hasimah
Published: (2005)
by: Ibrahim Teo, Noor Hasimah
Published: (2005)
Personalised cryptographic key generation based on FaceHashing
by: TEOH, A
Published: (2004)
by: TEOH, A
Published: (2004)
Multiple hashes of single key with passcode for multiple accounts
by: Lee, Kok-wah, et al.
Published: (2007)
by: Lee, Kok-wah, et al.
Published: (2007)
Authenticated spectrum sharing for secondary users in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
Fingerprinted secret sharing steganography for robustness against image cropping attacks
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Decoy states and two way quantum key distribution schemes
by: Shamsul Shaari, Jesni, et al.
Published: (2011)
by: Shamsul Shaari, Jesni, et al.
Published: (2011)
Using non-commutative monoids for construct three-party key establishment
by: Han, Song, et al.
Published: (2008)
by: Han, Song, et al.
Published: (2008)
Towards enhanced key management in multi-phase ZigBee network architecture
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
An improved information rate of perfect secret sharing scheme based on dominating set of vertices
by: Al-Saidi, Nadia M. G., et al.
Published: (2013)
by: Al-Saidi, Nadia M. G., et al.
Published: (2013)
Indexing-First-One Hashing based Cancellable Iris Template Generation
by: Lai, Yen Lung
Published: (2017)
by: Lai, Yen Lung
Published: (2017)
Weak+Vacuum and One Decoy States with Two Way Quantum Key Distribution Protocol
by: Abdul Khir, M. F., et al.
Published: (2013)
by: Abdul Khir, M. F., et al.
Published: (2013)
Improvement of a convertible undeniable partially blind signature scheme
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
New cheaper, faster way to heal
by: Chin, Christina
Published: (2019)
by: Chin, Christina
Published: (2019)
A Secure Key Management Model for Wireless Mesh Networks
by: Gao, Li, et al.
Published: (2010)
by: Gao, Li, et al.
Published: (2010)
Who Has the Keys to the Vault? Protecting Secrets on Laptops
by: Armstrong, Helen
Published: (2004)
by: Armstrong, Helen
Published: (2004)
Recovery And Tamper Localization For Reversible Iris Image Watermarking Scheme Using Hash Function
by: Muhammad Alif Aiman, Abd Samad
Published: (2023)
by: Muhammad Alif Aiman, Abd Samad
Published: (2023)
Design and Analysis of Voice Template Protection Schemes Based on Winner-takes-all Hashing
by: Chee, Kong Yik
Published: (2018)
by: Chee, Kong Yik
Published: (2018)
Independent attacks in imperfect settings: a case for two-way quantum key distribution scheme
by: Shamsul Shaari, Jesni, et al.
Published: (2010)
by: Shamsul Shaari, Jesni, et al.
Published: (2010)
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
Loss-tolerant stream authentication via configurable integration of one-time signatures and hash-graphs
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Similar Items
-
A key management scheme for heterogeneous sensor networks using keyed-hash chain
by: Tian, Biming, et al.
Published: (2009) -
An efficient self-healing key distribution scheme
by: Tian, Biming, et al.
Published: (2008) -
A self-healing and mutual-healing key distribution scheme using bilinear pairings for wireless networks
by: Tian, Biming, et al.
Published: (2008) -
A mutual-healing key distribution scheme in wireless sensor networks
by: Tian, Biming, et al.
Published: (2011) -
Generalized hash-binary-tree based self-healing key distribution with implicit authentication
by: Tian, Biming, et al.
Published: (2011)