Chinese remainder theorem-based RSA-threshold cryptography in MANET using verifiable secret sharing scheme

S Sarkar, B Kisku, S Misra… - 2009 IEEE International …, 2009 - ieeexplore.ieee.org
A mobile ad hoc network (MANET) is an infrastructure-less system having no designated
access points or routers and it has a dynamic topology. MANETs follow a distributed …

Security of ad hoc networks and threshold cryptography

L Ertaul, N Chavan - 2005 International Conference on …, 2005 - ieeexplore.ieee.org
A mobile ad hoc network (MANET) is a system of wireless mobile nodes that dynamically
self-organize in arbitrary and temporary network topologies allowing people and devices to …

Structuring proactive secret sharing in mobile ad-hoc networks

H Asaeda, M Rahma, Y Toyama - 2006 1st International …, 2006 - ieeexplore.ieee.org
Threshold cryptography is a novel cryptographic technique sharing secret among members.
It divides a secret key into multiple shares by a cryptographic operation. This technique is …

[PDF][PDF] Multi-level secret sharing scheme for mobile ad-hoc networks

PVS Kumar, RR Kurra, AN Tentu… - International Journal of …, 2014 - researchgate.net
-------------------------------------------------------------------ABSTRACT-------------------------------------------
------------------In this paper, we are concerned with security for Mobile Ad-hoc Networks …

Weighted threshold RSA based on the Chinese remainder theorem

S Iftene, M Grindei - … on Symbolic and Numeric Algorithms for …, 2007 - ieeexplore.ieee.org
Weighted Threshold RSA Based on the Chinese Remainder Theorem Page 1 Weighted
Threshold RSA Based on the Chinese Remainder Theorem Sorin Iftene Manuela Grindei Faculty …

[PDF][PDF] Elliptic curve cryptography based threshold cryptography (ecc-tc) implementation for manets

L Ertaul, N Chavan - IJCSNS, 2007 - researchgate.net
Summary A Mobile Ad hoc Network (MANET) consists of multiple wireless mobile devices
that form a network on the fly to allow communication with each other without any …

Public key cryptography sans certificates in ad hoc networks

N Saxena - Applied Cryptography and Network Security: 4th …, 2006 - Springer
Several researchers have proposed the use of threshold cryptographic model to enable
secure communication in ad hoc networks without the need of a trusted center. In this model …

A distributed ECC-DSS authentication scheme based on CRT-VSS and trusted computing in MANET

Q Lu, Y Xiong, W Huang, X Gong… - 2012 IEEE 11th …, 2012 - ieeexplore.ieee.org
With the rapid development of MANET, the secure and practical authentication problem in it
increasingly becomes outstanding. The existing work study the problem from two aspects, ie …

ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (I)

L Ertaul, W Lu - International Conference on Research in Networking, 2005 - Springer
This paper proposes a new approach to provide reliable data transmission in MANET with
strong adversaries. We combine Elliptic Curve Cryptography and Threshold Cryptosystem to …

[PDF][PDF] Secure routing scheme in MANETs using secret key sharing

A Amuthan, BA Baradwaj - International Journal of Computer Applications, 2011 - Citeseer
ABSTRACT A Mobile Ad-hoc NETwork (MANETs) follows a dynamic topology with
distributed architecture. MANETs has no basic infrastructure also has no fixed access point …