Identity-based key management for cloud computing.
Hong ZhuZhuolin MeiMeiyi XiePublished in: Secur. Commun. Networks (2016)
Keyphrases
- key management
- cloud computing
- ad hoc networks
- computing resources
- wireless sensor networks
- key distribution
- data center
- resource constrained
- cloud computing environment
- identity based cryptography
- key management scheme
- service providers
- signcryption scheme
- distributed computing
- digital signature
- data management
- provably secure
- secure communication
- secret key
- security issues
- bilinear pairings
- data privacy
- cloud computing platform
- elliptic curve
- security protocols
- sensor networks
- routing protocol