KEY MANAGEMENT IN CRYPTOGRAPHIC SYSTEMS |
| 4 | |
| 2010 |
| INFORMATION TECHNOLOGIES |
| scientific article | 681.3 | ||
| 165-169 | cryptography, cryptosystems, encryption, security, authenticity, key management protocols, elliptic curves |
| Some problems of encryption key management are considered. Requirements for key management protocols are
described. An approach to constant-round group key management based on elliptic curves is proposed. Proofs of the protocol characteristics are presented. |
| |


