Secure Key Management in the Cloud.
Ivan DamgårdThomas P. JakobsenJesper Buus NielsenJakob Illeborg PagterPublished in: IACR Cryptol. ePrint Arch. (2013)
Keyphrases
- key management
- key management scheme
- key distribution
- ad hoc networks
- wireless sensor networks
- cloud computing
- resource constrained
- secret sharing scheme
- diffie hellman
- provably secure
- security protocols
- secret key
- digital signature
- security threats
- identity based cryptography
- group communication
- elliptic curve
- secure communication
- security services
- security mechanisms
- key establishment
- authentication scheme
- resource constraints
- embedded systems
- data center
- wireless networks
- blind signature
- lightweight
- distributed systems