An authenticated self-healing key distribution scheme based on bilinear pairings
dc.contributor.author | Tian, Biming | |
dc.contributor.author | Chang, Elizabeth | |
dc.contributor.author | Hussain, Farookh Khadeer | |
dc.contributor.author | Dillon, Tharam S. | |
dc.contributor.author | Han, Song | |
dc.contributor.editor | Simon Gibbs, Alan Messer | |
dc.date.accessioned | 2017-01-30T13:45:07Z | |
dc.date.available | 2017-01-30T13:45:07Z | |
dc.date.created | 2010-02-04T20:02:16Z | |
dc.date.issued | 2009 | |
dc.identifier.citation | Tian, Biming and Chang, Elizabeth and Hussain, Farookh Khadeer and Dillon, Tharam S. and Han, Song. 2009. An authenticated self-healing key distribution scheme based on bilinear pairings, in Simon Gibbs, Alan Messer (ed), 6th Annual IEEE Consumer Communications & Networking Conference (CCNC 2009), Jan 10 2009, pp.1-5. Las Vegas, USA: IEEE. | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/34704 | |
dc.description.abstract |
Self-healing key distribution mechanism can be utilized for distributing session keys over an unreliable network.A self-healing key distribution scheme using bilinear pairings is proposed in this paper. As far as we know, it is the first pairingbased authenticated self-healing key distribution scheme. The scheme achieves a number of excellent properties. Firstly, the users can check the integrity and correctness of the ciphertext before carrying out more complex key recovery operations thus fruitless work can be avoided. Secondly, the scheme is collusion-free for any coalition of non-authorized users. Thirdly, the private key has nothing to do with the number of revoked users and can be reused as long as it is not disclosed. Finally, the storage overhead for each user is a constant. | |
dc.publisher | IEEE | |
dc.relation.uri | http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4784779 | |
dc.title | An authenticated self-healing key distribution scheme based on bilinear pairings | |
dc.type | Conference Paper | |
dcterms.source.startPage | 1 | |
dcterms.source.endPage | 5 | |
dcterms.source.title | Proceedings of the 6th annual IEEE consumer communications & networking conference (CCNC 2009) | |
dcterms.source.series | Proceedings of the 6th annual IEEE consumer communications & networking conference (CCNC 2009) | |
dcterms.source.isbn | 9781424423088 | |
dcterms.source.conference | 6th Annual IEEE Consumer Communications & Networking Conference (CCNC 2009) | |
dcterms.source.conference-start-date | Jan 10 2009 | |
dcterms.source.conferencelocation | Las Vegas, USA | |
dcterms.source.place | USA | |
curtin.note |
Copyright © 2009 IEEE This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. | |
curtin.department | Centre for Extended Enterprises and Business Intelligence | |
curtin.accessStatus | Open access | |
curtin.faculty | Curtin Business School | |
curtin.faculty | The Digital Ecosystems and Business Intelligence Institute (DEBII) |