Insider-Proof Encryption with Applications for Quantum Key Distribution.
Matthew McKagueLana SheridanPublished in: ICITS (2013)
Keyphrases
- key distribution
- key management
- secret key
- key exchange
- private key
- group communication
- ad hoc networks
- digital signature
- wireless sensor networks
- security protocols
- resource constrained
- secure communication
- smart card
- fault tolerant
- key management scheme
- signature scheme
- elliptic curve
- secret sharing scheme
- public key
- diffie hellman
- wireless ad hoc networks
- encryption scheme
- ciphertext
- signcryption scheme
- key establishment
- sensitive data
- authentication protocol
- security analysis
- hash functions
- wireless communication
- lightweight
- sensor networks