Unconditionally secure ring authentication.
Reihaneh Safavi-NainiShuhong WangYvo DesmedtPublished in: AsiaCCS (2007)
Keyphrases
- authentication mechanism
- user authentication
- security mechanisms
- authentication scheme
- password authentication
- authentication protocol
- identity management
- integrity verification
- factor authentication
- data encryption
- key distribution
- security requirements
- security analysis
- secure manner
- secure communication
- smart card
- key agreement
- rights management
- security services
- public key
- private key
- public key cryptography
- access control
- identity authentication
- public key encryption
- electronic payment
- resource constrained
- biometric authentication
- encryption decryption
- secret key
- security issues
- lightweight
- image authentication
- authentication systems
- mutual authentication
- security protocols
- key management
- information sharing
- public key infrastructure
- trusted third party
- cloud computing
- provably secure
- key exchange
- security properties
- secret sharing scheme
- standard model
- data security
- information security