A secure elliptic curve based anonymous authentication and key establishment mechanism for IoT and cloud.
Anuj Kumar SinghAnand NayyarAnkit GargPublished in: Multim. Tools Appl. (2023)
Keyphrases
- key management
- elliptic curve
- key establishment
- symmetric key
- key distribution
- public key cryptography
- diffie hellman
- elliptic curve cryptography
- ad hoc networks
- key agreement
- security services
- wireless sensor networks
- resource constrained
- cloud computing
- digital signature
- security protocols
- authentication scheme
- secure communication
- secret sharing scheme
- secret key
- group communication
- provably secure
- authentication protocol
- routing protocol
- private key
- secret sharing
- security mechanisms
- public key
- resource constraints
- end to end
- peer to peer
- user authentication