Security of Okamoto Identification Scheme: a Defense against Ephemeral Key Leakage and Setup.
Lukasz KrzywieckiMiroslaw KutylowskiPublished in: SCC@AsiaCCS (2017)
Keyphrases
- high security
- private key
- network security
- secure communication
- intrusion detection
- security analysis
- cyber defense
- diffie hellman
- image encryption
- public key
- digital signature scheme
- protection schemes
- protection scheme
- access control
- elliptic curve cryptography
- information leakage
- information security
- secret sharing scheme
- authentication scheme
- encryption scheme
- secret key
- key distribution
- security requirements
- computer security
- elliptic curve
- security model
- identity based cryptography
- security issues
- encryption key
- key management
- authentication mechanism
- intrusion detection system
- public key cryptosystem
- statistical databases
- electronic voting
- computer networks
- blind signature scheme
- key agreement protocol
- ad hoc networks
- signature scheme
- user authentication
- security mechanisms