Comment on "Identity-based non-interactive key distribution with forward security".
Xi Jun LinRan RenZhengang WeiLin SunPublished in: Des. Codes Cryptogr. (2015)
Keyphrases
- key distribution
- key management
- signcryption scheme
- fault tolerant
- group communication
- private key
- authentication protocol
- key agreement protocol
- signature scheme
- secret key
- wireless sensor networks
- elliptic curve
- diffie hellman
- key management scheme
- security protocols
- resource constrained
- ad hoc networks
- identity based cryptography
- secret sharing scheme
- standard model
- key exchange
- security services
- real time
- digital signature
- secure communication
- provably secure
- fault tolerance
- smart card
- key agreement
- wireless ad hoc networks
- lightweight
- session key