Proxy Encryptions for Secure Multicast Key Management.
Ritesh MukherjeeJ. William AtwoodPublished in: LCN (2003)
Keyphrases
- key management
- key management scheme
- bilinear pairings
- ad hoc networks
- wireless ad hoc networks
- wireless sensor networks
- key distribution
- routing algorithm
- group communication
- resource constrained
- digital signature
- provably secure
- identity based cryptography
- security protocols
- security services
- wireless networks
- secret key
- trusted third party
- elliptic curve
- secret sharing scheme
- end to end
- secure communication
- key establishment
- diffie hellman
- mobile ad hoc networks
- network topology
- sensor networks