Secure deduplication with reliable and revocable key management in fog computing.
Hyunsoo KwonChanghee HahnKyungtae KangJunbeom HurPublished in: Peer-to-Peer Netw. Appl. (2019)
Keyphrases
- key management
- key management scheme
- ad hoc networks
- key distribution
- resource constrained
- wireless sensor networks
- secret sharing scheme
- group communication
- security threats
- digital signature
- security protocols
- provably secure
- security services
- secret key
- secure communication
- key establishment
- identity based cryptography
- diffie hellman
- elliptic curve
- authentication scheme
- secret sharing
- sensor networks
- routing algorithm
- smart card
- routing protocol
- quality of service
- power system