Identity-Based Conference Key Distribution Scheme Using Sealed Lock.
Yongquan CaiXiuying LiPublished in: ACIS-ICIS (2008)
Keyphrases
- key distribution
- key management
- fault tolerant
- signcryption scheme
- secret key
- private key
- signature scheme
- authentication protocol
- group communication
- elliptic curve
- smart card
- key agreement protocol
- key management scheme
- diffie hellman
- resource constrained
- standard model
- security protocols
- wireless ad hoc networks
- high dimensional
- fault tolerance
- distributed systems
- sensor networks
- wireless sensor networks