Efficient security primitives derived from a secure aggregation algorithm

@inproceedings{Chan2008EfficientSP,
  title={Efficient security primitives derived from a secure aggregation algorithm},
  author={Haowen Chan and Adrian Perrig},
  booktitle={ACM Conference on Computer and Communications Security},
  year={2008}
}
By functionally decomposing a specific algorithm (the hierarchical secure aggregation algorithm of Chan et al. [3] and Frikken et al. [7]), we uncover a useful general functionality which we use to generate various efficient network security primitives, including: a signature scheme ensuring authenticity, integrity and non-repudiation for arbitrary node-to-node communications; an efficient broadcast authentication algorithm not requiring time synchronization; a scheme for managing public keys… CONTINUE READING
Highly Cited
This paper has 36 citations. REVIEW CITATIONS
22 Citations
3 References
Similar Papers

Citations

Publications citing this paper.
Showing 1-10 of 22 extracted citations

References

Publications referenced by this paper.

Similar Papers

Loading similar papers…