A proposal of efficient scheme of key management using ID-based encryption and Biometrics.
Akitoshi IzumiYoshifumi UeshigePublished in: MUE (2007)
Keyphrases
- key management
- provably secure
- key distribution
- key management scheme
- blind signature
- secret sharing scheme
- ad hoc networks
- bilinear pairings
- resource constrained
- symmetric key
- identity based cryptography
- secure communication
- wireless sensor networks
- secret key
- blind signature scheme
- public key cryptography
- signcryption scheme
- diffie hellman
- partially blind signature scheme
- digital signature
- elliptic curve
- group communication
- authentication scheme
- security protocols
- key establishment
- encryption decryption
- encryption scheme
- security services
- public key