An efficient anonymous authentication mechanism for delay tolerant networks
โ Scribed by Renwang Su; Zhenfu Cao
- Publisher
- Elsevier Science
- Year
- 2010
- Tongue
- English
- Weight
- 376 KB
- Volume
- 36
- Category
- Article
- ISSN
- 0045-7906
No coin nor oath required. For personal study only.
โฆ Synopsis
Security and privacy are crucial to the wide deployments of delay tolerant networks. Without security and privacy guarantees, people are reluctant to accept such a new network paradigm. To address the security and privacy issues in delay tolerant networks, in this paper, based on ID-based ring signatures and Merkle hash tree techniques, we present a new efficient anonymous authentication mechanism. The newly proposed mechanism not only achieves good security properties, including authentication, anonymity and confidentiality, but also has strong robustness and high efficiency.
๐ SIMILAR VOLUMES
We propose a mechanism for auctioning bundles of multiple divisible goods in a network where buyers want the same amount of bandwidth on each link in their route. Buyers can specify multiple routes (corresponding to a source-destination pair). The total flow can then be split among these multiple ro