Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks.
Xiaoqian LiPeng WangBao LiZhelei SunPublished in: Inscrypt (2013)
Keyphrases
- encryption scheme
- wireless sensor networks
- secret key
- authentication scheme
- hash functions
- key distribution
- key management
- security analysis
- smart card
- ciphertext
- standard model
- sensor networks
- energy consumption
- public key
- sensor nodes
- secure communication
- secret sharing scheme
- diffie hellman
- routing protocol
- similarity search
- resource constrained
- cca secure
- provably secure
- forward secure
- secret sharing
- data distribution
- security model
- signature scheme
- wireless communication
- lightweight
- private key
- proxy re encryption
- high dimensional
- databases