On the security of AUTH, a provably secure authentication protocol based on the subspace LPN problem.
Panagiotis RizomiliotisStefanos GritzalisPublished in: Int. J. Inf. Sec. (2013)
Keyphrases
- authentication protocol
- provably secure
- public key
- security model
- hash functions
- security analysis
- key management
- security protocols
- secret key
- diffie hellman
- private key
- signature scheme
- blind signature scheme
- encryption scheme
- smart card
- key distribution
- digital signature
- rfid tags
- cryptographic protocols
- trusted third party
- low dimensional
- lightweight
- secure communication
- standard model
- security properties
- dimensionality reduction
- information systems
- nearest neighbor
- principal component analysis
- peer to peer
- ad hoc networks
- real time
- resource constrained