Authenticated Public Key Distribution Scheme Without Trusted Third Party.
Jae Hyung KooBum Han KimDong Hoon LeePublished in: EUC Workshops (2005)
Keyphrases
- public key
- trusted third party
- digital signature
- authentication scheme
- authentication protocol
- key distribution
- key exchange
- private key
- security analysis
- secret key
- signature scheme
- diffie hellman
- secure communication
- security model
- smart card
- elliptic curve
- provably secure
- key management
- encryption scheme
- user authentication
- third party
- ciphertext
- rfid tags
- intrusion detection
- credit card