On the construction of a powerful distributed authentication server without additional key management.
Seong-Min HongSeungwon LeeYongsoo ParkYookun ChoHyunsoo YoonPublished in: Comput. Commun. (2000)
Keyphrases
- key management
- key distribution
- group communication
- identity based cryptography
- security services
- secure communication
- authentication protocol
- ad hoc networks
- security protocols
- resource constrained
- wireless sensor networks
- authentication scheme
- secret key
- digital signature
- security mechanisms
- key management scheme
- encryption decryption
- distributed systems
- peer to peer
- secret sharing scheme
- client server
- fault tolerant
- public key cryptography
- user authentication
- elliptic curve
- public key
- end to end
- lightweight