An efficient and provably secure authenticated key agreement scheme for mobile edge computing.
Mohammad Amin RakeeiFarokhlagha MoazamiPublished in: IACR Cryptol. ePrint Arch. (2020)
Keyphrases
- provably secure
- key agreement protocol
- diffie hellman assumption
- standard model
- security model
- key management
- signature scheme
- public key
- blind signature
- hash functions
- diffie hellman
- blind signature scheme
- public key cryptography
- threshold signature scheme
- security analysis
- bilinear pairings
- proxy re encryption
- digital signature
- access control
- group communication
- key distribution
- similarity measure
- secret key
- ad hoc networks
- peer to peer