Provably secure lightweight client authentication scheme with anonymity for TMIS using chaotic hash function.
Vishesh P. GaikwadJitendra V. TembhurneChandrashekhar MeshramCheng-Chi LeePublished in: J. Supercomput. (2021)
Keyphrases
- provably secure
- authentication scheme
- hash functions
- lightweight
- secret key
- authentication protocol
- trusted third party
- blind signature scheme
- key management
- public key
- similarity search
- image encryption
- blind signature
- block cipher
- user authentication
- key distribution
- smart card
- diffie hellman
- encryption scheme
- bilinear pairings
- secure communication
- wireless sensor networks
- security analysis
- signature scheme
- rfid tags
- security properties
- security model
- data distribution
- standard model
- knn
- similarity measure