Security Analysis of a Path Validation Scheme With Constant-Size Proof.
Yangyang WuChangsong JiangChunxiang XuKefei ChenPublished in: IEEE Trans. Inf. Forensics Secur. (2021)
Keyphrases
- security analysis
- security requirements
- public key
- smart card
- high security
- elliptic curve cryptography
- authentication protocol
- security model
- key exchange
- private key
- authentication scheme
- image encryption
- encryption scheme
- user authentication
- security properties
- mutual authentication
- proxy signature scheme
- encryption algorithm
- software engineering
- standard model
- password guessing