Secure cloud storage with anonymous deduplication using ID-based key management.
Mohammed GharibMohammadAmin FazliPublished in: J. Supercomput. (2023)
Keyphrases
- key management
- cloud storage
- key distribution
- cloud computing
- provably secure
- bilinear pairings
- key management scheme
- wireless sensor networks
- ad hoc networks
- diffie hellman
- resource constrained
- secret key
- signcryption scheme
- ciphertext
- group communication
- secret sharing scheme
- secure communication
- digital signature
- security protocols
- security services
- distributed computing
- key establishment
- peer to peer
- elliptic curve
- public key
- blind signature scheme
- digital libraries
- private key
- security issues
- blind signature
- data center
- routing protocol
- response time