By Topic

Notice of Retraction
A new certificateless threshold signature scheme for mobile ad hoc network

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Weidao Zhang ; Dept. of Comput. Sci., Xiamen Univ., Xiamen, China ; Zhongwen Li ; Zhibin Xu ; Jing Yang

Notice of Retraction

After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

The presenting author of this paper has the option to appeal this decision by contacting TPII@ieee.org.

Mobile ad hoc network (MANET) provides an alternative for military applications and disaster response scenarios where fixed networking infrastructure may not be available, but it faces significantly more security considerations than wired network due to its lack of physical infrastructures or centralized authorities. So it poses a number of security challenges to a protocol designer. The main contribution of this paper is a certificateless threshold signature scheme without a trusted party based on the difficulty of solving the computational bilinear Diffie-Hellman problem. Comparing to most of the presented schemes, nodes of our scheme cooperate to generate the master key to eliminate any form of trusted third party and do not need to use any certificate to guarantee the authenticity of the public key. The proposed signature scheme overcomes the inherent key escrow problem of the ID-based public key cryptography (ID-PKC) while avoiding the complicated certificates management of the public key infrastructure (PKI). Moreover, it is provably secure.

Published in:

Computer and Communication Technologies in Agriculture Engineering (CCTAE), 2010 International Conference On  (Volume:2 )

Date of Conference:

12-13 June 2010