1. An efficient anonymous authentication mechanism for delay tolerant networks
- Author
-
Renwang Su and Zhenfu Cao
- Subjects
Delay-tolerant networking ,General Computer Science ,business.industry ,Computer science ,Data_MISCELLANEOUS ,Computer security ,computer.software_genre ,Merkle tree ,Ring signature ,Security service ,Control and Systems Engineering ,Robustness (computer science) ,Network Access Control ,Confidentiality ,Electrical and Electronic Engineering ,business ,computer ,Computer network ,Anonymity - Abstract
Security and privacy are crucial to the wide deployments of delay tolerant networks. Without security and privacy guarantees, people are reluctant to accept such a new network paradigm. To address the security and privacy issues in delay tolerant networks, in this paper, based on ID-based ring signatures and Merkle hash tree techniques, we present a new efficient anonymous authentication mechanism. The newly proposed mechanism not only achieves good security properties, including authentication, anonymity and confidentiality, but also has strong robustness and high efficiency.
- Published
- 2010
- Full Text
- View/download PDF