๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

An efficient anonymous authentication mechanism for delay tolerant networks

โœ Scribed by Renwang Su; Zhenfu Cao


Publisher
Elsevier Science
Year
2010
Tongue
English
Weight
376 KB
Volume
36
Category
Article
ISSN
0045-7906

No coin nor oath required. For personal study only.

โœฆ Synopsis


Security and privacy are crucial to the wide deployments of delay tolerant networks. Without security and privacy guarantees, people are reluctant to accept such a new network paradigm. To address the security and privacy issues in delay tolerant networks, in this paper, based on ID-based ring signatures and Merkle hash tree techniques, we present a new efficient anonymous authentication mechanism. The newly proposed mechanism not only achieves good security properties, including authentication, anonymity and confidentiality, but also has strong robustness and high efficiency.


๐Ÿ“œ SIMILAR VOLUMES


An efficient Nash-implementation mechani
โœ Rahul Jain; Jean Walrand ๐Ÿ“‚ Article ๐Ÿ“… 2010 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 422 KB

We propose a mechanism for auctioning bundles of multiple divisible goods in a network where buyers want the same amount of bandwidth on each link in their route. Buyers can specify multiple routes (corresponding to a source-destination pair). The total flow can then be split among these multiple ro