Comparative analysis of applications of identity-based cryptosystem in IoT.
C. RameshK. Venu Gopala RaoD. VasumathiPublished in: Electron. Gov. an Int. J. (2017)
Keyphrases
- comparative analysis
- image encryption
- key management
- private key
- chaotic maps
- secret sharing scheme
- key distribution
- signature scheme
- signcryption scheme
- ciphertext
- public key
- digital signature
- encryption scheme
- wireless sensor networks
- resource constrained
- management system
- elliptic curve
- ad hoc networks
- identity based cryptography
- standard model
- secret key
- public key cryptosystem
- provably secure
- security protocols
- semi quantitative
- cloud computing
- big data
- group communication
- authentication and key agreement
- diffie hellman
- fault tolerant
- security services
- location information
- secure communication
- proxy re encryption
- smart objects
- resource constraints
- sensor networks
- data analysis