Identity-based and anonymous key agreement protocol for fog computing resistant in the Canetti-Krawczyk security model.
Simone PatonicoAn BraekenKris SteenhautPublished in: Wirel. Networks (2023)
Keyphrases
- provably secure
- security model
- key agreement protocol
- public key
- access control
- authentication and key agreement
- security analysis
- signature scheme
- bilinear pairings
- security requirements
- public key cryptography
- key management
- encryption scheme
- diffie hellman
- standard model
- key distribution
- hash functions
- peer to peer