Generic transformation from broadcast encryption to round-optimal deniable ring authentication.
Keisuke HaraTakahiro MatsudaGoichiro HanaokaKeisuke TanakaPublished in: Des. Codes Cryptogr. (2022)
Keyphrases
- authentication protocol
- security analysis
- secret key
- mutual authentication
- user authentication
- encryption decryption
- data encryption
- image authentication
- identity authentication
- smart card
- elliptic curve cryptography
- encryption scheme
- public key
- optimal solution
- authentication scheme
- public key cryptography
- end to end
- peer to peer