New efficient user identification and key distribution scheme providing enhanced security.
Yanjiang YangShuhong WangFeng BaoJie WangRobert H. DengPublished in: Comput. Secur. (2004)
Keyphrases
- key distribution
- key management
- provably secure
- key pre distribution
- private key
- authentication protocol
- fault tolerant
- group communication
- key agreement
- key exchange
- key management scheme
- secret key
- secure communication
- signcryption scheme
- diffie hellman
- security protocols
- key agreement protocol
- elliptic curve
- user authentication
- low cost
- cost effective
- wireless sensor networks
- secret sharing scheme
- resource constrained
- trusted third party
- digital signature
- public key cryptography
- real time
- security analysis
- network security
- ad hoc networks
- lightweight
- digital libraries