An authenticated, secure, and mutable multiple-session-keys protocol based on elliptic curve cryptography and text-to-image encryption algorithm.
Ahmad AbusukhonZeyad MohammadAli Al-ThaherPublished in: Concurr. Comput. Pract. Exp. (2022)
Keyphrases
- authentication scheme
- elliptic curve cryptography
- image encryption
- cryptographic algorithms
- image encryption algorithm
- key distribution
- secret key
- security analysis
- authentication protocol
- elliptic curve
- public key cryptosystems
- key agreement protocol
- public key
- high security
- private key
- key exchange
- user authentication
- key management
- lightweight
- smart card
- provably secure
- public key cryptography
- diffie hellman
- security protocols
- security requirements
- hash functions
- security properties
- security model
- secure communication
- signature scheme
- digital signature
- group communication
- security issues