Hybrid deniable and short-key encryption protocols based on the authentication procedure.
Sy Tan HoAlexander Andreevich MoldovyanMoldovyan Nikolay AndreevichCanh Hoang NgocMinh Nguyen HieuLich Van LuuTien Van NguyenManh Cong TranPublished in: ACOMP (2020)
Keyphrases
- authentication protocol
- security analysis
- private key
- public key
- secret key
- high security
- mutual authentication
- key distribution
- cryptographic protocols
- smart card
- secure communication
- security protocols
- authentication scheme
- lightweight
- rfid tags
- image encryption
- digital signature
- public key cryptography
- encryption scheme
- symmetric key
- security properties
- encryption decryption
- user authentication
- elliptic curve cryptography
- key exchange
- encryption algorithm
- security requirements
- ciphertext
- identity authentication
- signature scheme
- low cost
- image authentication
- information systems
- trusted third party
- security mechanisms