Attacks and Comments on Several Recently Proposed Key Management Schemes.
Niu LiuShaohua TangLingling XuPublished in: IACR Cryptol. ePrint Arch. (2013)
Keyphrases
- key management
- key management scheme
- security threats
- security protocols
- provably secure
- wireless sensor networks
- resource constrained
- ad hoc networks
- digital signature
- key distribution
- bilinear pairings
- secret sharing scheme
- secret key
- mobile ad hoc networks
- secure communication
- public key cryptography
- identity based cryptography
- diffie hellman
- cryptographic protocols
- elliptic curve
- mobile networks
- smart card