Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
6878814 | Ad Hoc Networks | 2014 | 8 Pages |
Abstract
Indeed, our main contribution is twofold. On the one hand, we construct schemes that are attractive in terms of simplicity, computational complexity, number of bits read from the shared random source and expansion factor of the initial key to the final shared key. On the other hand, we show how to transform any existing scheme for key exchange in BSM into a more efficient scheme in the number of bits it reads from the shared source, given that the source is transmitted in frames.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Shlomi Dolev, Niv Gilboa, Marina Kopeetsky, Giuseppe Persiano, Paul G. Spirakis,