Authentication and Key Management Automation in Decentralized Secure Email and Messaging via Low-entropy Secrets.
Itzel Vázquez SandovalArash AtashpendarGabriele LenziniPublished in: ICETE (2) (2020)
Keyphrases
- key management
- key distribution
- symmetric key
- security services
- identity based cryptography
- secure communication
- authentication scheme
- key management scheme
- ad hoc networks
- resource constrained
- wireless sensor networks
- digital signature
- secret key
- group communication
- fault tolerant
- security protocols
- elliptic curve
- encryption decryption
- public key cryptography
- distributed systems
- secret sharing scheme
- peer to peer
- provably secure
- key establishment
- security mechanisms
- private key
- diffie hellman
- authentication protocol
- user authentication
- public key
- lightweight
- resource constraints
- routing protocol
- digital watermarking