Cargando…
Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication
Many group key management protocols have been proposed to manage key generation and distribution of vehicular communication. However, most of them suffer from high communication and computation costs due to the complex elliptic curve and bilinear pairing cryptography. Many shared secret protocols ha...
Autores principales: | Abdel Hakeem, Shimaa A., Kim, HyungWon |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8749701/ https://www.ncbi.nlm.nih.gov/pubmed/35009873 http://dx.doi.org/10.3390/s22010331 |
Ejemplares similares
-
Multi-Zone Authentication and Privacy-Preserving Protocol (MAPP) Based on the Bilinear Pairing Cryptography for 5G-V2X
por: Hakeem, Shimaa A. Abdel, et al.
Publicado: (2021) -
A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks
por: Hakeem, Shimaa A. Abdel, et al.
Publicado: (2021) -
A Kind of (t, n) Threshold Quantum Secret Sharing with Identity Authentication
por: Meng, Depeng, et al.
Publicado: (2023) -
A Rivest–Shamir–Adleman-Based Robust and Effective Three-Factor User Authentication Protocol for Healthcare Use in Wireless Body Area Networks
por: Liu, Kaijun, et al.
Publicado: (2023) -
Dynamic Group Authentication and Key Exchange Scheme Based on Threshold Secret Sharing for IoT Smart Metering Environments
por: Lee, Dae-Hwi, et al.
Publicado: (2018)