Hybrid identity based cryptographic scheme optimization using machine learning in WSN.
Constantin GrumazescuValentin-Alexandru VladutaAndrei TimoftePublished in: ECAI (2018)
Keyphrases
- key management
- machine learning
- key management scheme
- key distribution
- wireless sensor networks
- secret sharing scheme
- secure communication
- identity based cryptography
- optimization problems
- optimization scheme
- provably secure
- encryption scheme
- resource constrained
- signcryption scheme
- bilinear pairings
- public key cryptography
- hash functions
- authentication and key agreement
- decision trees
- ad hoc networks
- smart card
- blind signature scheme
- secret sharing
- optimization algorithm
- support vector machine
- digital signature
- security protocols
- standard model
- evolutionary algorithm
- diffie hellman
- machine learning algorithms
- resource limitations
- optimization method
- natural language processing
- text classification
- public key encryption
- identity based encryption
- cca secure
- key establishment
- proxy re encryption
- sensor networks
- energy efficient
- machine learning methods
- authentication scheme
- sensor nodes