Tighter bounds on entropy of secret keys in authentication codes.
Junji ShikataPublished in: ITW (2017)
Keyphrases
- secret key
- authentication scheme
- upper bound
- encryption decryption
- key agreement
- lower bound
- secure communication
- key distribution
- authentication protocol
- smart card
- session key
- public key
- mutual authentication
- private key
- image authentication
- user authentication
- key management
- encryption scheme
- pseudorandom
- security analysis
- public key cryptography
- diffie hellman
- elliptic curve
- security properties
- key agreement protocol
- ciphertext
- signature scheme
- secret data
- group communication
- digital signature
- security mechanisms
- fault tolerant
- nearest neighbor
- hash functions
- real time