Identity-based authentication scheme for the Internet of Things.
Ola SalmanSarah AbdallahImad H. ElhajjAli ChehabAyman I. KayssiPublished in: ISCC (2016)
Keyphrases
- authentication scheme
- key management
- secret key
- signature scheme
- public key
- key distribution
- signcryption scheme
- encryption scheme
- authentication protocol
- ciphertext
- smart card
- security analysis
- security flaws
- user authentication
- image authentication
- provably secure
- resource constrained
- digital signature
- bilinear pairings
- wireless sensor networks
- secret sharing scheme
- ad hoc networks
- blind signature scheme
- blind signature
- diffie hellman
- information sharing