Tunable Encrypted Deduplication with Attack-resilient Key Management.
Zuoru YangJingwei LiYanjing RenPatrick P. C. LeePublished in: ACM Trans. Storage (2022)
Keyphrases
- key management
- secret key
- encryption decryption
- encryption scheme
- ciphertext
- encryption algorithm
- wireless sensor networks
- resource constrained
- key distribution
- secret sharing scheme
- key management scheme
- security threats
- ad hoc networks
- smart card
- public key
- digital signature
- authentication scheme
- security services
- identity based cryptography
- pseudorandom
- secure communication
- diffie hellman
- elliptic curve
- hash functions
- provably secure
- security protocols
- group communication
- private key
- high dimensional
- sensor nodes