Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments.
Wei LiXuelian LiJuntao GaoHaiyu WangPublished in: IEEE Trans. Dependable Secur. Comput. (2021)
Keyphrases
- key management
- key distribution
- computing environments
- group communication
- security protocols
- secure communication
- key management scheme
- provably secure
- diffie hellman
- key exchange protocol
- wireless sensor networks
- key agreement protocol
- ad hoc networks
- digital signature
- lightweight
- authentication protocol
- secret key
- resource constrained
- key establishment
- fault tolerant
- key exchange
- security services
- secret sharing scheme
- signature scheme
- authentication scheme
- elliptic curve
- fault tolerance
- private key
- trusted computing
- security properties
- cryptographic protocols
- blind signature
- real time
- computing platform