An Efficient Identity Authentication Scheme With Provable Security and Anonymity for Mobile Edge Computing.
Yuan XuYanwei ZhouBo YangZirui QiaoZhaolong WangZhe XiaMingwu ZhangPublished in: IEEE Syst. J. (2023)
Keyphrases
- authentication scheme
- user authentication
- smart card
- elliptic curve cryptography
- security flaws
- security analysis
- secret key
- authentication protocol
- image encryption
- public key
- individual privacy
- security properties
- security requirements
- key management
- information security
- key agreement
- image authentication
- mobile commerce
- sensitive data
- digital signature
- security issues
- ring signature scheme
- mutual authentication
- ciphertext
- blind signature scheme
- query processing
- rfid tags
- low cost