References
- L. Lilien, Z. H. Kamal, V. Bhuse, and A. Gupta, “Opportunistic Networks : The Concept and Research Challenges in Privacy and Security,” workshop, vol. 134–147, 2006.
- M. Alajeely, R. Doss, and A. Ahmad, “Security and Trust in Opportunistic Networks – A Survey,” IETE Tech. Rev., vol. 33, no. 3, pp. 256–268, 2016, doi: https://doi.org/10.1080/02564602.2015.1094383.
- Y. Wu, Y. Zhao, M. Riguidel, G. Wang, and P. Yi, “Security and trust management in opportunistic networks: A survey,” Secur. Commun. Networks, vol. 8, no. 9, pp. 1812–1827, 2015, doi: https://doi.org/10.1002/sec.1116.
- L. Lilien, S. Member, A. Gupta, and Z. Yang,”Standard Implementation Framework for Opportunistic Networks in Emergency Preparedness and Response Applications,” Management, pp. 588–593, 2007.
- U. P. Singh and N. Chauhan, “Authentication using Trust Framework in Opportunistic Networks,” 2017.
- A. Ahmad, R. Doss, M. Alajeely, S. F. Al Rubeaai, and D. Ahmad, “Packet integrity defense mechanism in OppNets,” Comput. Secur., vol. 74, pp. 71–93, 2018, doi: https://doi.org/10.1016/j.cose.2018.01.007.
- P. Kumar, N. Chauhan, and N. Chand, “Authentication with Privacy Preservation in Opportunistic Networks,” in International Conference on Inventive Communication and Computational Technologies, 2017, no. Icicct, pp. 183–188.
- Y. Ma and A. Jamalipour, “Opportunistic node authentication in intermittently connected mobile ad hoc networks,” in 2010 16th Asia-Pacific Conference on Communications, APCC 2010, 2010, pp. 453–457, doi: https://doi.org/10.1109/APCC.2010.5679991.
- A. Albeshri, S. A. Chaudhry, and S. Kumari, “Cryptanalysis and improvement of a Multi-server Authentication protocol by,” vol. 12, no. 1, pp. 523–549, 2018.
- C. Y. Aung, G. G. N. Ali, M. Zhao, R. Cai, P. Han, and J. Chong, “Information Epidemics Control for Data Delivery in Opportunistic Networks,” 2016.
- R. D. Julio Lopez, “An Overview of Ellipti? Curve Cryptography,” Inst. Comput. State Univ. Campinas, 2000.
- D. Mahto, D. A. Khan, and D. K. Yadav, “Security Analysis of Elliptic Curve Cryptography,” vol. I, 2016.
- D. Boneh, A. Joux, and P. Q. Nguyen, “Why Textbook ElGamal and RSA Encryption ( Extended Abstract ),” Int. Conf. Theory Appl. Cryptol. Inf. Secur. Springer, Berlin, Heidelberg, 2000., pp. 30–43.
- A. V Meier, “The ElGamal Cryptosystem,” pp. 1–13, 2005.
- M. Abouaroek and K. Ahmad, “Node Authentication Using NTRU Algorithm in Opportunistic Network,” Scalable Comput. Pract. Exp., vol. 20, no. 1, pp. 83–92, 2019, doi: https://doi.org/10.12694/scpe.v20i1.1481.
- P. Wang, T. Xiang, X. Li, and H. Xiang, “Public key encryption with conjunctive keyword search on lattice,” J. Inf. Secur. Appl., vol. 51, 2020, doi: https://doi.org/10.1016/j.jisa.2019.102433.
- D. Abbasinezhad-Mood and M. Nikooghadam, “Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications,” Futur. Gener. Comput. Syst., vol. 84, pp. 47–57, 2018, doi: https://doi.org/10.1016/j.future.2018.02.034.
- W. Y. Seo, “Comparing RSA, ECC, and Post Quantum Cryptography,” J. Math. Anal. Appl, vol. 11, pp. 19–33, 2018.
- H. T. Loriya, A. Kulshreshta, and D. R. Keraliya, “Security Analysis of Various Public Key Cryptosystems for Authentication and Key Agreement in Wireless Communication Network,” vol. 6, no. 2, 2017, doi: https://doi.org/10.17148/IJARCCE.2017.6262.
- I. Kaur and A. Verma, “Ticket based Secure Authentication Scheme using NTRU Cryptosystem in Wireless Sensor Network,” vol. 15, no. 2, pp. 55–66, 2017.
- X.-F. Wong, B.-M. Goi, W.-K. Lee, and R. C.-W. Phan, “Performance Evaluation of RSA and NTRUover GPU with Maxwell and PascalArchitecture,” Softw. Netw., vol. 2017, no. 1, pp. 201–220, 2017, doi: https://doi.org/10.13052/jsn2445-9739.2017.010.
- W. C. Kuo, H. J. Wei, and J. C. Cheng, “An efficient and secure anonymous mobility network authentication scheme,” J. Inf. Secur. Appl., vol. 19, no. 1, pp. 18–24, 2014, doi: https://doi.org/10.1016/j.jisa.2013.12.002.
- M. Goyal and M. Chaudhary, “Ensuring Privacy in opportunistic Network,” IOSR J. Comput. Eng., vol. 13, no. 2, pp. 74–82, 2013. doi: https://doi.org/10.9790/0661-1327482
- V. V. B. Poonguzharselvi, “Data Forwarding in Opportunistic Network Using Mobile Traces,” in Computer Science Conference Proceedings (CSCP) 2012, pp. 425–430, ISSN:2231-5403, doi: https://doi.org/10.5121/csit.2012.2441.
- J. Solis, P. Ginzboorg, and N. Asokan, “Best-Effort Authentication for Opportunistic Networks,” 2011.
- A. Shikfa, “Security issues in opportunistic networks,” in Proceedings of the Second International Workshop on Mobile Opportunistic Networking, 2010, pp. 215–216, doi: https://doi.org/10.1145/1755743.1755795.
- A. Elhadad, “Data sharing using proxy re-encryption based on DNA computing,” Soft Comput., vol. 24, no. 3, pp. 2101–2108, 2020, doi: https://doi.org/10.1007/s00500-019-04041-z.
- J. Hermans, F. Vercauteren, and B. Preneel, “Speed Records of NTRU,” vol. 5985, pp. 73–88, 2010, doi: https://doi.org/10.1007/978-3-642-11925-5.
- P. S. Hirschhorn, J. Hoffstein, N. Howgrave-Graham, and W. Whyte, “Choosing NTRUEncrypt parameters in light of combined lattice reductionand MITMapproaches,” Lect. Notes Comput. Sci.(including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 5536 LNCS, pp. 437–455, 2009, doi: https://doi.org/10.1007/978-3-642-01957-9_27.
- X. Shen, Z. Du, and R. Chen, “Research on NTRU algorithm for mobile Java security,” Int. Conf. Scalable Comput. Commun. - 8th Int. Conf. Embed. Comput. ScalCom-EmbeddedCom 2009, pp. 366–369, 2009, doi: https://doi.org/10.1109/EmbeddedCom-ScalCom.2009.72.
- R. Nayak, C. V. Sastry, and J. Pradhan, “A matrix formulation for NTRU cryptosystem,” Proc. 2008 16th Int. Conf. Networks, ICON 2008, 2008, doi: https://doi.org/10.1109/ICON.2008.4772602.
- OpenSSL, http://www.openssl.org. Last date accessed on 20 October 2020
- LibreSSL 3.2.2, http://www.libressl.org. Last date accessed on 20 October 2020
- Bahig, Hatem M., Ashraf M. Bhery, and Dieaa I. Nassr. “Cryptanalysis of NTRU where the private polynomial has one or more consecutive zero coefficients.” Journal of Discrete Mathematical Sciences and Cryptography 23.8 (2020): 1493-1513. doi: https://doi.org/10.1080/09720529.2019.1641268
- Yassein, Hassan R., Nadia MG Al-Saidi, and Alaa K. Farhan. “A new NTRU cryptosystem outperforms three highly secured NTRU-analog systems through an innovational algebraic structure.” Journal of Discrete Mathematical Sciences and Cryptography (2020): 1-20. doi: https://doi.org/10.1080/09720529.2020.1741218
- Chuang, Jones Pi-Chang. “A new approach for matrix NTRU.” Journal of Discrete Mathematical Sciences and Cryptography 17.1 (2014): 91-98. doi: https://doi.org/10.1080/09720529.2013.878820