Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs.
Vadim LyubashevskyDaniel MasnyPublished in: CRYPTO (2) (2013)
Keyphrases
- key agreement
- public key encryption
- user authentication
- authentication scheme
- authentication mechanism
- data encryption
- identity management
- graphical password
- password authentication
- key distribution
- security mechanisms
- security analysis
- factor authentication
- integrity verification
- secure manner
- authentication protocol
- provably secure
- security requirements
- key management scheme
- key agreement protocol
- secret key
- elliptic curve
- diffie hellman
- key management
- security properties
- security services
- security model
- public key cryptography
- cryptographic protocols
- key exchange protocol
- mutual authentication
- smart card
- public key
- identity authentication
- standard model
- cloud computing
- lightweight
- encryption decryption
- authentication systems
- image authentication
- security protocols