Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'.
Muhammad Khurram KhanSoo-Kyun KimKhaled AlghathbarPublished in: Comput. Commun. (2011)
Keyphrases
- provably secure
- remote user authentication scheme
- key management
- user authentication
- key agreement
- encryption scheme
- secret key
- diffie hellman
- smart card
- signature scheme
- key distribution
- security requirements
- security model
- security analysis
- security issues
- blind signature
- hash functions
- public key
- standard model
- security mechanisms
- blind signature scheme
- security level
- security properties
- security management
- access control
- cost effective
- key agreement protocol
- information security
- security services
- security protocols
- authentication scheme
- network security
- security measures
- security policies
- authentication protocol
- bilinear pairings
- electronic voting
- elliptic curve
- ring signature scheme
- group communication
- block cipher
- cryptographic protocols
- information systems