Id-Based Aggregate Signature Scheme and Its Application in Authenticated Routing

An aggregate signature scheme can aggregate n signatures on n distinct messages from n distinct signers into a single signature.Thus,n verification equations can be reduced to one.So the aggregate signature adapts to Mobile Ad hoc Network (MANET). In this paper, we propose an efficient ID-based aggr...

Full description

Saved in:
Bibliographic Details
Main Authors: Wang, Daxing (Author), Teng, Jikai (Author)
Format: EJournal Article
Published: Institute of Advanced Engineering and Science, 2014-01-01.
Subjects:
Online Access:Get fulltext
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02103 am a22002893u 4500
001 ijeecs3065_1088
042 |a dc 
100 1 0 |a Wang, Daxing  |e author 
100 1 0 |e contributor 
700 1 0 |a Teng, Jikai  |e author 
245 0 0 |a Id-Based Aggregate Signature Scheme and Its Application in Authenticated Routing 
260 |b Institute of Advanced Engineering and Science,   |c 2014-01-01. 
520 |a An aggregate signature scheme can aggregate n signatures on n distinct messages from n distinct signers into a single signature.Thus,n verification equations can be reduced to one.So the aggregate signature adapts to Mobile Ad hoc Network (MANET). In this paper, we propose an efficient ID-based aggregate signature scheme with constant pairing computations. Compared with the existing ID-based aggregate signature schemes,this scheme greatly improves the efficiency of signature communication and verification. In addition, in this work, we apply our ID-based aggregate signature to authenticated routing protocol to present a secure routing scheme. Our scheme not only provides sound authentication and a secure routing protocol in ad hoc networks, but also meets the nature of MANET. DOI : http://dx.doi.org/10.11591/telkomnika.v12i1.3456 
540 |a Copyright (c) 2013 Institute of Advanced Engineering and Science 
540 |a http://creativecommons.org/licenses/by-nc-nd/4.0 
546 |a eng 
690 |a Technology; Electrical, Electronics and Computer Engineering 
690 |a Identity-based cryptography; Aggregate signature; Bilinear pairings; Authenticated routing scheme 
655 7 |a info:eu-repo/semantics/article  |2 local 
655 7 |a info:eu-repo/semantics/publishedVersion  |2 local 
655 7 |2 local 
786 0 |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 12, No 1: January 2014; 802-808 
786 0 |n 2502-4760 
786 0 |n 2502-4752 
786 0 |n 10.11591/ijeecs.v12.i1 
787 0 |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3065/1088 
856 4 1 |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3065/1088  |z Get fulltext