Cryptanalysis of Dynamic ID-Based User Authentication Scheme Using Smartcards Without Verifier Tables.
Jaewook JungYounsung ChoiDonghoon LeeJiye KimJongho MunDongho WonPublished in: CSA/CUTE (2015)
Keyphrases
- authentication scheme
- smart card
- secret key
- user authentication
- public key
- java card
- authentication protocol
- signature scheme
- digital signature
- key distribution
- security analysis
- key agreement
- encryption scheme
- key management
- diffie hellman
- designated verifier
- information security
- security requirements
- public key cryptography
- high dimensional data
- real time