Secret sharing schemes provide a natural way of addressing security issues in mobile ad hoc networks. This paper introduces a flexible framework for secure end-to-end transmission of confidential information which exploits multipath source routing and hierarchical shares distribution. Such a goal is achieved by designing a ideal, perfect, and eventually verifiable secret sharing scheme based on Birkhoff polynomial interpolation and by establishing suitable hierarchies among independent paths.
Hierarchical secret sharing in ad hoc networks through Birkhoff interpolation / Ballico, Edoardo; Boato, Giulia; Fontanari, Claudio; Granelli, Fabrizio. - ELETTRONICO. - (2005), pp. 1-14.
Hierarchical secret sharing in ad hoc networks through Birkhoff interpolation
Ballico, Edoardo;Boato, Giulia;Fontanari, Claudio;Granelli, Fabrizio
2005-01-01
Abstract
Secret sharing schemes provide a natural way of addressing security issues in mobile ad hoc networks. This paper introduces a flexible framework for secure end-to-end transmission of confidential information which exploits multipath source routing and hierarchical shares distribution. Such a goal is achieved by designing a ideal, perfect, and eventually verifiable secret sharing scheme based on Birkhoff polynomial interpolation and by establishing suitable hierarchies among independent paths.File | Dimensione | Formato | |
---|---|---|---|
DIT-04-080.pdf
accesso aperto
Tipologia:
Versione editoriale (Publisher’s layout)
Licenza:
Tutti i diritti riservati (All rights reserved)
Dimensione
312.3 kB
Formato
Adobe PDF
|
312.3 kB | Adobe PDF | Visualizza/Apri |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione