Identity based secure authentication scheme based on quantum key distribution for cloud computing.
Geeta SharmaSheetal KalraPublished in: Peer-to-Peer Netw. Appl. (2018)
Keyphrases
- cloud computing
- authentication scheme
- key distribution
- secret key
- key management
- authentication protocol
- smart card
- group communication
- signcryption scheme
- secure communication
- data management
- public key
- diffie hellman
- user authentication
- private key
- security issues
- signature scheme
- distributed computing
- wireless sensor networks
- security analysis
- security protocols
- key agreement
- ad hoc networks
- digital signature
- encryption scheme
- elliptic curve
- ciphertext
- resource constrained
- privacy preserving
- provably secure
- database systems
- cryptographic protocols
- lightweight
- sensor networks
- bilinear pairings