Secret key-based Identification and Authentication with a Privacy Constraint.
Kittipong KittichokechaiGiuseppe CairePublished in: CoRR (2015)
Keyphrases
- secret key
- authentication protocol
- mutual authentication
- authentication scheme
- encryption decryption
- smart card
- key distribution
- public key
- secure communication
- session key
- pseudorandom
- user authentication
- key agreement
- stream cipher
- cryptographic protocols
- security mechanisms
- security level
- security analysis
- hash functions
- encryption scheme
- private key
- rfid systems
- trusted third party
- key management
- personal information
- security requirements
- signature scheme
- identity management
- privacy preserving
- digital signature
- lightweight
- block cipher
- rfid tags
- public key cryptography
- image authentication
- personal data