Wireless sensor networks consist of a huge number of small nodes, communicating wirelessly, to transmit any sort of measured data, like temperature, radiation, etc. At the air interface, unprotected messages can be easily intercepted and modified by an attacker. Traditionally, symmetric cryptography is deployed in sensor networks, due to the nodes being constrained in terms of energy, processing power and memory. If an attacker is now able to extract the secret symmetric key from a single node, the entire (or a huge subset of the) network is compromised. Threshold cryptography is an attractive approach to this problem: by separating the secret into several parts, an attacker has to compromise at least t + 1 nodes to be able to extract a meaningful value. In this work we investigate computational optimizations to the multiparty multiplication protocol of Gennaro, Rabin, and Rabin, thereby improving the running time of certain protocol steps by a factor of up to 6. © Springer-Verlag Berlin Heidelberg 2012.
CITATION STYLE
Koschuch, M., Hudler, M., Krüger, M., Lory, P., & Wenzl, J. (2012). Shared security: How wireless sensor networks can benefit from threshold cryptography. In Communications in Computer and Information Science (Vol. 314, pp. 74–81). https://doi.org/10.1007/978-3-642-35755-8_6
Mendeley helps you to discover research relevant for your work.