{"title":"Ad Hoc网络中分层假名签名方案与自生成假名系统","authors":"Xiaojun Dang, Yang Zhang","doi":"10.1109/ICWMC.2008.19","DOIUrl":null,"url":null,"abstract":"The anonymous mechanism of existing anonymous routing protocols in ad hoc networks significantly degraded their routing performances. To resolve the problem, this paper proposes a hierarchical pseudonym-based signature scheme and a self-generated pseudonym system based on the former. The signature scheme can be easily used to construct pseudonym system and non-interactively update private decryption keys. The self-generated pseudonym system features with following eminent characteristics: a node creates legal pseudonyms itself without participation of organization management center; there is unique pseudonym to be generated during the same period; the pseudonyms cannot be used up; nodes can independently authenticate each other with attaching less bytes than zero-knowledge protocol in classical pseudonym systems.","PeriodicalId":308667,"journal":{"name":"2008 The Fourth International Conference on Wireless and Mobile Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Hierarchical Pseudonym-Based Signature Scheme and Self-Generated Pseudonym System in Ad Hoc Networks\",\"authors\":\"Xiaojun Dang, Yang Zhang\",\"doi\":\"10.1109/ICWMC.2008.19\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The anonymous mechanism of existing anonymous routing protocols in ad hoc networks significantly degraded their routing performances. To resolve the problem, this paper proposes a hierarchical pseudonym-based signature scheme and a self-generated pseudonym system based on the former. The signature scheme can be easily used to construct pseudonym system and non-interactively update private decryption keys. The self-generated pseudonym system features with following eminent characteristics: a node creates legal pseudonyms itself without participation of organization management center; there is unique pseudonym to be generated during the same period; the pseudonyms cannot be used up; nodes can independently authenticate each other with attaching less bytes than zero-knowledge protocol in classical pseudonym systems.\",\"PeriodicalId\":308667,\"journal\":{\"name\":\"2008 The Fourth International Conference on Wireless and Mobile Communications\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-07-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 The Fourth International Conference on Wireless and Mobile Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICWMC.2008.19\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 The Fourth International Conference on Wireless and Mobile Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICWMC.2008.19","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Hierarchical Pseudonym-Based Signature Scheme and Self-Generated Pseudonym System in Ad Hoc Networks
The anonymous mechanism of existing anonymous routing protocols in ad hoc networks significantly degraded their routing performances. To resolve the problem, this paper proposes a hierarchical pseudonym-based signature scheme and a self-generated pseudonym system based on the former. The signature scheme can be easily used to construct pseudonym system and non-interactively update private decryption keys. The self-generated pseudonym system features with following eminent characteristics: a node creates legal pseudonyms itself without participation of organization management center; there is unique pseudonym to be generated during the same period; the pseudonyms cannot be used up; nodes can independently authenticate each other with attaching less bytes than zero-knowledge protocol in classical pseudonym systems.