A Novel Identity-Based Key Management and Encryption Scheme for Distributed System.
Geng YangQiang ZhouXiaolong XuJian XuChunming RongPublished in: CSS (2012)
Keyphrases
- distributed systems
- encryption scheme
- key management
- secret key
- standard model
- security analysis
- key distribution
- signcryption scheme
- smart card
- public key
- secure communication
- diffie hellman
- identity based cryptography
- fault tolerant
- ciphertext
- cca secure
- secret sharing scheme
- digital signature
- security protocols
- resource constrained
- wireless sensor networks
- load balancing
- group communication
- provably secure
- ad hoc networks
- security services
- software architecture
- hash functions
- fault tolerance
- signature scheme
- mobile agents
- bilinear pairings
- identity based encryption
- data sharing
- private key
- elliptic curve
- security model
- proxy re encryption
- wireless networks
- database applications