Deniable Authentication when Signing Keys Leak.
Suvradip ChakrabortyDennis HofheinzUeli MaurerGuilherme RitoPublished in: IACR Cryptol. ePrint Arch. (2023)
Keyphrases
- authentication protocol
- secret key
- signature scheme
- hash functions
- public key
- smart card
- private key
- security analysis
- user authentication
- authentication scheme
- key distribution
- private information
- lightweight
- secure communication
- ciphertext
- rfid tags
- sign language
- real time
- diffie hellman
- signature verification
- standard model
- security protocols
- information flow
- encryption scheme
- similarity search
- key management
- third party