Secure user-identification and key distribution scheme preserving anonymity.
Somanath TripathySukumar NandiPublished in: Int. J. Secur. Networks (2008)
Keyphrases
- key distribution
- key management
- authentication protocol
- fault tolerant
- group communication
- secret key
- diffie hellman
- user authentication
- key management scheme
- private key
- signature scheme
- trusted third party
- elliptic curve
- key exchange
- security protocols
- key agreement protocol
- authentication scheme
- key agreement
- secret sharing scheme
- ad hoc networks
- security properties
- security analysis
- resource constrained
- provably secure
- signcryption scheme
- distributed systems
- digital libraries
- digital signature
- secure communication
- fault tolerance
- smart card