Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds.
Piotr K. TysowskiM. Anwarul HasanPublished in: IACR Cryptol. ePrint Arch. (2011)
Keyphrases
- key management
- mobile applications
- ad hoc networks
- mobile devices
- key distribution
- key management scheme
- resource constrained
- wireless sensor networks
- digital signature
- symmetric key
- secret key
- mobile phone
- group communication
- mobile users
- context aware
- security protocols
- user experience
- elliptic curve
- secret sharing scheme
- secure communication
- security services
- end users
- provably secure
- lightweight
- encryption decryption
- key establishment
- identity based cryptography
- cloud computing
- distributed systems
- smart card
- routing protocol