Authentication and Key Management Automation in Decentralized Secure Email and Messaging via Low-Entropy Secrets.
Itzel Vázquez SandovalArash AtashpendarGabriele LenziniPublished in: CoRR (2020)
Keyphrases
- key management
- key distribution
- symmetric key
- security services
- secure communication
- identity based cryptography
- ad hoc networks
- key management scheme
- authentication scheme
- resource constrained
- wireless sensor networks
- group communication
- security protocols
- digital signature
- provably secure
- secret key
- security threats
- secret sharing scheme
- fault tolerant
- encryption decryption
- security mechanisms
- public key cryptography
- peer to peer
- key establishment
- authentication protocol
- distributed systems
- private key
- elliptic curve
- trusted third party
- user authentication
- diffie hellman
- secret sharing
- real time
- routing algorithm
- end to end