Citation: | WANG Xingfu, LU Qiwei, XIONG Yan, et al., “A Secure Distributed Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET,” Chinese Journal of Electronics, vol. 23, no. 2, pp. 284-290, 2014, |
Adi Shamir, "How to share a secret", Commun. ACM, Vol.22, pp.612-613, 1979.
|
Xiong Yan, Miao Fuyou, Zhang Weichao, and WANG Xingfu, "Distributed authentication based on multi-hop signing with encrypted signature functions in mobile ad hoc networks", Acta Electronica Sinica, Vol.31, No.2, pp.161-165, 2003.
|
Kamer Kaya and Ali Selçuk, "Robust threshold schemes based on the chinese remainder theorem", Progress in Cryptology C AFRICACRYPT 2008, Lecture Notes in Computer Science, Vol.5023, pp.94-108, Springer Berlin / Heidelberg, 2008.
|
R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, "Robust threshold dss signatures", Advances in Cryptology EUROCRYPT96, pp.354-371, Springer, 1996.
|
Ernie Brickell, Jan Camenisch, and Liqun Chen, "Direct anonymous attestation", Proceedings of the 11th ACM conference on Computer and communications security, CCS 04, ACM, pp.132-145, New York, NY, USA, 2004.
|
Liqun Chen, Hans Löhr, Mark Manulis, and Ahmad-Reza Sadeghi, "Property-based attestation without a trusted third party", Lecture Notes in Computer Science, Vol.5222, ISC, pp.31-46. Springer, 2008.
|
Wenchao Huang, Yan Xiong, and Depin Chen, "Daaodv: A secure ad hoc routing protocol based on direct anonymous attestation", Proc. Int. Conf. Computational Science and Engineering CSE 09, Vol.2, pp.809-816, 2009.
|
Qiwei Lu, Yan Xiong, Xudong Gong, and Wenchao Huang, "Secure collaborative outsourced data mining with multi-owner in cloud computing", Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, IEEE, pp.100-108. 2012.
|
Charles Asmuth and John Bloom, "A modular approach to key safeguarding", Information Theory, IEEE Transactions, Vol.29, No.2, pp.208-210, 1983.
|
K. Kaya and A. Selçuk, "A verifiable secret sharing scheme based on the chinese remainder theorem", Progress in Cryptology-INDOCRYPT 2008, pp.414-425, 2008.
|
Cohen Benaloh, "Secret sharing homomorphisms: Keeping shares of a secret secret (extended abstract)", CRYPTO: Proceedings of Crypto, 1986.
|
Sorin Iftene, "Secret sharing schemes with applications in security protocols", Sci. Ann. Cuza Univ., Vol.16, pp.63-96, 2006.
|
M. Ben-Or, S. Goldwasser, and A. Wigderson, "Completeness theorems for non-cryptographic fault-tolerant distributed computation", Proceedings of the twentieth annual ACM symposium on Theory of computing, ACM, pp.1-10, 1988.
|
Ali Bagherzandi, Stanislaw Jarecki, Nitesh Saxena, and Yanbin Lu, "Password-protected secret sharing", ACM Conference on Computer and Communications Security, pp.433-444, 2011.
|
Lidong Zhou and Z.J. Haas, "Securing ad hoc networks", Network, IEEE, Vol.13, No.6, pp.24-30, 1999.
|
C. A. R. Hoare, Communicating Sequential Processes, Prentice-Hall, 1985.
|
Steve Schneider, "Verifying authentication protocols in csp", IEEE Trans. Software Eng., Vol.24, No.9, pp.741-758, 1998.
|
G. Lowe, "Breaking and fixing the needham-schroeder publickey protocol using fdr", Tools and Algorithms for the Construction and Analysis of Systems, pp.147-166, 1996.
|