{"title":"Hierarchical Pseudonym-Based Signature Scheme and Self-Generated Pseudonym System in Ad Hoc Networks","authors":"Xiaojun Dang, Yang Zhang","doi":"10.1109/ICWMC.2008.19","DOIUrl":null,"url":null,"abstract":"The anonymous mechanism of existing anonymous routing protocols in ad hoc networks significantly degraded their routing performances. To resolve the problem, this paper proposes a hierarchical pseudonym-based signature scheme and a self-generated pseudonym system based on the former. The signature scheme can be easily used to construct pseudonym system and non-interactively update private decryption keys. The self-generated pseudonym system features with following eminent characteristics: a node creates legal pseudonyms itself without participation of organization management center; there is unique pseudonym to be generated during the same period; the pseudonyms cannot be used up; nodes can independently authenticate each other with attaching less bytes than zero-knowledge protocol in classical pseudonym systems.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 The Fourth International Conference on Wireless and Mobile Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICWMC.2008.19","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
The anonymous mechanism of existing anonymous routing protocols in ad hoc networks significantly degraded their routing performances. To resolve the problem, this paper proposes a hierarchical pseudonym-based signature scheme and a self-generated pseudonym system based on the former. The signature scheme can be easily used to construct pseudonym system and non-interactively update private decryption keys. The self-generated pseudonym system features with following eminent characteristics: a node creates legal pseudonyms itself without participation of organization management center; there is unique pseudonym to be generated during the same period; the pseudonyms cannot be used up; nodes can independently authenticate each other with attaching less bytes than zero-knowledge protocol in classical pseudonym systems.