Revolutionizing Cloud Security: Leveraging Quantum Computing and Key Distribution for Enhanced Protection.
Ashutosh KumarGarima VermaPublished in: Rev. Socionetwork Strateg. (2023)
Keyphrases
- key distribution
- quantum computing
- key management
- authentication protocol
- group communication
- private key
- information security
- fault tolerant
- secret key
- wireless sensor networks
- diffie hellman
- signcryption scheme
- security protocols
- key management scheme
- elliptic curve
- smart card
- quantum mechanics
- cloud computing
- resource constrained
- ad hoc networks
- security analysis
- key exchange
- mobile computing
- signature scheme
- wireless ad hoc networks
- lightweight
- data protection
- security issues
- key agreement
- standard model
- security mechanisms
- security requirements
- access control