Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution.
Carlo BlundoLuiz A. Frota MattosDouglas R. StinsonPublished in: CRYPTO (1996)
Keyphrases
- key distribution
- key management
- key management scheme
- group communication
- resource constrained
- secret key
- key establishment protocol
- provably secure
- secure communication
- key exchange
- key agreement
- private key
- diffie hellman
- ad hoc networks
- wireless sensor networks
- digital signature
- symmetric key
- elliptic curve
- security properties
- secret sharing scheme
- key agreement protocol
- security protocols
- resource constraints
- authentication scheme
- security services
- sensor networks
- key establishment
- data storage
- wireless ad hoc networks
- security mechanisms
- smart card
- authentication protocol
- encryption scheme
- public key cryptography
- fault tolerance
- fault tolerant