Deniable Authentication When Signing Keys Leak.
Suvradip ChakrabortyDennis HofheinzUeli MaurerGuilherme RitoPublished in: EUROCRYPT (3) (2023)
Keyphrases
- authentication protocol
- secret key
- signature scheme
- hash functions
- public key
- smart card
- private key
- authentication scheme
- user authentication
- security analysis
- key distribution
- lightweight
- private information
- rfid tags
- security protocols
- key agreement
- secure communication
- signature verification
- standard model
- key management
- ciphertext
- encryption scheme
- information flow
- digital signature
- software engineering
- provably secure
- trusted third party
- data streams