"I Can't Believe It's Not Custodial!": Usable Trustless Decentralized Key Management.
Tanusree SharmaVivek C. NairHenry WangYang WangDawn SongPublished in: CHI (2024)
Keyphrases
- key management
- ad hoc networks
- resource constrained
- wireless sensor networks
- key management scheme
- peer to peer
- security threats
- secret key
- provably secure
- identity based cryptography
- security protocols
- key distribution
- digital signature
- elliptic curve
- secret sharing scheme
- secure communication
- wireless ad hoc networks
- security services
- distributed systems
- key establishment
- resource constraints
- group communication
- bilinear pairings
- real time
- multipath
- wireless networks
- sensor networks
- advanced metering infrastructure