Secret key-based Authentication with a Privacy Constraint.
Kittipong KittichokechaiGiuseppe CairePublished in: CoRR (2015)
Keyphrases
- secret key
- authentication protocol
- mutual authentication
- authentication scheme
- smart card
- encryption decryption
- key distribution
- secure communication
- public key
- session key
- security mechanisms
- pseudorandom
- private key
- stream cipher
- key agreement
- security analysis
- user authentication
- diffie hellman
- key management
- rfid tags
- security level
- hash functions
- rfid systems
- encryption scheme
- image authentication
- identity management
- real time
- trusted third party
- data security
- security services
- privacy preserving
- electronic payment
- security protocols
- security issues
- signature scheme
- lightweight
- data sets