On the security of two signature schemes for secure communication in IoT environments.
Feihong XuHui ZengPublished in: Multim. Tools Appl. (2024)
Keyphrases
- secure communication
- signature scheme
- public key
- secret key
- digital signature
- key management
- diffie hellman
- digital signature scheme
- provably secure
- standard model
- private key
- key distribution
- security model
- security analysis
- smart card
- public key cryptography
- encryption scheme
- security protocols
- authentication protocol
- identity based cryptography
- ad hoc networks
- secret sharing
- resource constrained
- group communication
- information security
- wireless sensor networks
- network security
- computing environments
- distributed databases
- distributed systems