Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication.
Koudai HatakeyamaDaisuke KotaniYasuo OkabePublished in: CoRR (2022)
Keyphrases
- public key
- key management
- symmetric key
- secure communication
- digital signature
- authentication scheme
- secret key
- key distribution
- public key cryptography
- security analysis
- image authentication
- private key
- provably secure
- authentication protocol
- diffie hellman
- public key infrastructure
- encryption scheme
- security services
- identity based cryptography
- wireless sensor networks
- ad hoc networks
- security model
- elliptic curve cryptography
- smart card
- user authentication
- signature scheme
- signcryption scheme
- bilinear pairings
- elliptic curve
- blind signature
- resource constrained
- group communication
- security mechanisms
- security protocols
- secret sharing scheme
- data streams
- digital images
- wireless networks
- rfid tags
- digital watermarking