ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (I)

25Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper proposes a new approach to provide reliable data transmission in MANET with strong adversaries. We combine Elliptic Curve Cryptography and Threshold Cryptosystem to securely deliver messages in n shares. As long as the destination receives at least k shares, it can recover the original message. We explore seven ECC mechanisms, El-Gamal, Massey-Omura, Diffie-Hellman, Menezes-Vanstone, Koyama-Maurer-Okamoto-Vanstone, Ertaul, and Demytko. For secure data forwarding, we consider both splitting plaintext before encryption, and splitting ciphertext after encryption. Also we suggest to exchange keys between a pair of mobile nodes using Elliptic Curve Cryptography Diffie-Hellman. We did performance comparison of ECC and RSA to show ECC is more efficient than RSA. © IFIP International Federation for Information Processing 2005.

Cite

CITATION STYLE

APA

Ertaul, L., & Lu, W. (2005). ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (I). In Lecture Notes in Computer Science (Vol. 3462, pp. 102–113). Springer Verlag. https://doi.org/10.1007/11422778_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free