Yet another insecure group key distribution scheme using secret sharing.
Chris J. MitchellPublished in: J. Inf. Secur. Appl. (2021)
Keyphrases
- key distribution
- secret sharing scheme
- key management
- secret sharing
- private key
- secure communication
- visual cryptography
- wireless sensor networks
- secret key
- ad hoc networks
- diffie hellman
- resource constrained
- group communication
- visual cryptography scheme
- key management scheme
- elliptic curve
- digital signature
- security protocols
- wireless ad hoc networks
- authentication protocol
- fault tolerant
- low cost
- image quality
- sensor networks