Learn More
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. Recently, several pairwise key schemes have been proposed for large distributed sensor networks. These schemes randomly select a set of keys from a key pool and install the keys in the memory of(More)
In 1982, and Taylor proposed an elegant solution to rhe partially ordered multilevel key distribution problem, using a cryptographic approach. Since then, continuing research has been conducred to try to realize and simplify their scheme. Generally speaking, there are two problems associated with their scheme. First, a large value associated with each(More)
In a (t, n) secret sharing scheme, a secret s is divided into n shares and shared among a set of n shareholders by a mutually trusted dealer in such a way that any t or more than t shares will be able to reconstruct this secret; but fewer than t shares cannot know any information about the secret. When shareholders present their shares in the secret(More)
— Secure Electronic Mail (e-mail), such as PGP and S/MIME, uses digital signature to provide message authentica-tion, which also provides the undesired non-repudiation evidence of the message sender. In this paper, we introduce a fully deniable e-mail authentication service. Our design can be easily integrated into the current PGP and S/MIME to provide(More)