Title
Wireless Networks: Certificateless ID-based authentication using threshold signature for P2P MANETs
Abstract/Description
As far as the security of MANET (mobile and ad hoc network) is concerned, it depends upon the secure authentication especially for P2P MANETs. Identity based encryption was introduced to construct Public Key without requiring a certificate. Therefore, certificateless authentication combined with threshold digital signature and efficient key generation using identities such as IP address, are the challenging issues in front of researchers. In this paper we have addressed the problem of identity based secure authentication employing well-known RSA algorithm and secret sharing to generate threshold signature on a message.
Keywords
Certficateless authentication, Identity-based encryption, Threshold signature, P2P MANETs, Secret sharing
Location
Eiffel 3
Session Theme
Wireless Networks
Session Type
Other
Session Chair
Dr. Mudassar Farooq
Start Date
16-8-2009 3:25 PM
End Date
16-8-2009 3:45 PM
Recommended Citation
Samreen, A., & Ansari, S. (2009). Wireless Networks: Certificateless ID-based authentication using threshold signature for P2P MANETs. International Conference on Information and Communication Technologies. Retrieved from https://ir.iba.edu.pk/icict/2009/2009/17
Included in
Information Security Commons, OS and Networks Commons, Technology and Innovation Commons
Wireless Networks: Certificateless ID-based authentication using threshold signature for P2P MANETs
Eiffel 3
As far as the security of MANET (mobile and ad hoc network) is concerned, it depends upon the secure authentication especially for P2P MANETs. Identity based encryption was introduced to construct Public Key without requiring a certificate. Therefore, certificateless authentication combined with threshold digital signature and efficient key generation using identities such as IP address, are the challenging issues in front of researchers. In this paper we have addressed the problem of identity based secure authentication employing well-known RSA algorithm and secret sharing to generate threshold signature on a message.