Non-interactive Deniable Authentication Protocol Using Generalized ECDSA Signature Scheme.
Jayaprakash KarPublished in: ISA (2011)
Keyphrases
- authentication protocol
- public key
- signature scheme
- digital signature
- smart card
- secret key
- security analysis
- standard model
- authentication scheme
- user authentication
- secure communication
- diffie hellman
- hash functions
- key distribution
- cryptographic protocols
- private key
- encryption scheme
- rfid tags
- lightweight
- trusted third party
- security requirements
- information security
- information systems
- real time