An ID-based Non-Interactive Deniable Authentication Protocol based on ECC.
Susmita MandalSujata MohantyBanshidhar MajhiPublished in: ICCNS (2017)
Keyphrases
- authentication protocol
- public key
- security analysis
- key distribution
- encryption scheme
- smart card
- user authentication
- authentication scheme
- signature scheme
- diffie hellman
- secret key
- rfid tags
- digital signature
- lightweight
- cryptographic protocols
- rfid systems
- private key
- security properties
- low cost
- elliptic curve
- security protocols
- security requirements
- mutual authentication
- standard model
- database systems
- provably secure
- trusted third party