Secure Multicast Using Proxy Encryption.
Yun-Peng ChiuChin-Laung LeiChun-Ying HuangPublished in: ICICS (2005)
Keyphrases
- key management
- key management scheme
- encryption scheme
- key exchange
- digital signature
- security properties
- data encryption
- security analysis
- proxy re encryption
- stream cipher
- trusted third party
- bilinear pairings
- cryptographic protocols
- integrity verification
- secret key
- standard model
- encryption decryption
- ad hoc networks
- secure communication
- advanced encryption standard
- mutual authentication
- public key cryptography
- ciphertext
- bandwidth requirements
- high security
- private key
- wireless networks
- smart card
- security requirements
- security protocols
- key distribution
- authentication scheme
- wireless sensor networks
- encryption algorithms
- data confidentiality
- group communication
- overlay network
- public key
- diffie hellman
- original signer
- data protection
- multicast routing
- resource constrained
- content delivery
- routing algorithm
- digital rights management
- data security
- security mechanisms
- cryptographic algorithms
- authentication protocol
- provably secure
- congestion control
- signcryption scheme
- encryption algorithm
- security services
- network coding
- block cipher