Login / Signup
An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes.
Taek-Young Youn
Changhoon Lee
Young-Ho Park
Published in:
Comput. Commun. (2011)
Keyphrases
</>
authentication protocol
authentication scheme
smart card
user authentication
security analysis
key agreement
secret key
public key
lightweight
security protocols
rfid tags
cryptographic protocols
security flaws
hash functions
ciphertext
information security
security requirements