Explore chapters and articles related to this topic
Fault-Tolerant Based Group Key Servers with Enhancement of Utilizing the Contributory Server for Cloud Storage Applications
Published in IETE Journal of Research, 2023
K. Vivekrabinson, K. Muneeswaran
The main challenges in the key management schemes are computational complexity, storage complexity, communication complexity, and maintaining forward and backward secrecy. In this section, we discuss various key management techniques on both centralized and contributory methods. The Diffie–Hellman key exchange protocol [24] is the first public key-based key management scheme which implements the public key authentication via binding the certificate with the public key. The certificates are managed by trusted third parties but the cost of managing the certificate list is high.