Impersonation Attack on a Strong ID-Based Key Distribution.
Jung Yeon HwangJongin LimDong Hoon LeePublished in: IEICE Trans. Commun. (2008)
Keyphrases
- power consumption
- key distribution
- authentication protocol
- rfid tags
- secret key
- smart card
- group communication
- security analysis
- lightweight
- public key
- security protocols
- authentication scheme
- private key
- diffie hellman
- key exchange
- signcryption scheme
- hash functions
- key management
- security requirements
- secure communication
- trusted third party
- key agreement protocol
- mutual authentication