A Secure and Efficient Handover Authentication and Key Management Protocol for 5G Networks.
Jiaqi HuangYi QianPublished in: J. Commun. Inf. Networks (2020)
Keyphrases
- key management
- key distribution
- provably secure
- symmetric key
- public key cryptography
- security protocols
- group communication
- security services
- key agreement protocol
- secure communication
- wireless ad hoc networks
- ad hoc networks
- resource constrained
- key management scheme
- authentication protocol
- wireless sensor networks
- identity based cryptography
- secret key
- key establishment
- private key
- secret sharing scheme
- authentication scheme
- digital signature
- blind signature
- fault tolerant
- diffie hellman
- security analysis
- standard model
- elliptic curve
- security requirements
- security model
- encryption decryption
- blind signature scheme
- signature scheme
- mobile networks
- trusted third party
- secret sharing
- smart card
- cost effective
- wireless networks
- lightweight
- bilinear pairings
- hash functions
- mobile nodes
- security properties