Secure Homomorphic and Searchable Encryption in Ad Hoc Networks.
Scott C.-H. HuangQiao-Wei LinChih-Kai ChangPublished in: ICPP (2013)
Keyphrases
- ad hoc networks
- key management
- encryption scheme
- network topology
- end to end
- secure communication
- key management scheme
- symmetric key
- digital signature
- routing protocol
- cryptographic protocols
- routing algorithm
- key distribution
- security protocols
- wireless ad hoc networks
- wireless networks
- group key agreement
- quality of service
- diffie hellman
- provably secure
- secure routing
- mobile ad hoc networks
- security services
- mac protocol
- privacy preserving
- group communication
- peer to peer
- identity based cryptography
- key establishment
- mobile wireless
- multimedia streaming
- multi hop
- elliptic curve
- key exchange
- standard model
- service differentiation
- digital libraries
- security analysis
- public key cryptography
- mobile nodes
- routing scheme
- security properties
- mobile networks
- neighboring nodes
- private key
- wireless mesh networks
- public key