Authenticated Key Distribution: When the Coupon Collector is Your Enemy.
Marc BeunardeauFatima-Ezzahra El OrcheDiana MaimutDavid NaccachePeter B. RønnePeter Y. A. RyanPublished in: IACR Cryptol. ePrint Arch. (2019)
Keyphrases
- key distribution
- key management
- fault tolerant
- rfid tags
- authentication protocol
- secret key
- group communication
- key exchange
- elliptic curve
- key agreement protocol
- diffie hellman
- signature scheme
- private key
- resource constrained
- signcryption scheme
- low cost
- authentication scheme
- ad hoc networks
- wireless sensor networks