Secret Key-based Authentication With Passive Eavesdropper for Scalar Gaussian Sources.
Vamoua YachongkaHideki YagiYasutada OohamaPublished in: ISIT (2022)
Keyphrases
- secret key
- authentication scheme
- encryption decryption
- key distribution
- secure communication
- authentication protocol
- session key
- smart card
- key agreement
- public key
- private key
- pseudorandom
- key management
- security level
- security analysis
- mutual authentication
- encryption scheme
- image authentication
- diffie hellman
- hash functions
- vector valued
- stream cipher
- data sources
- ciphertext
- group communication
- user authentication
- database systems
- signature scheme
- real time
- cost effective