Secret Key-based Authentication With Passive Eavesdropper for Scalar Gaussian Sources.
Vamoua YachongkaHideki YagiYasutada OohamaPublished in: CoRR (2022)
Keyphrases
- secret key
- authentication scheme
- encryption decryption
- authentication protocol
- key distribution
- secure communication
- smart card
- session key
- key agreement
- public key
- pseudorandom
- mutual authentication
- key management
- private key
- security analysis
- security level
- image authentication
- encryption scheme
- stream cipher
- vector valued
- data sources
- diffie hellman
- security requirements
- digital signature
- public key cryptography
- signature scheme
- rfid tags
- database systems