Robust biometric identity authentication scheme using quantum voice encryption and quantum secure direct communications for cybersecurity.
Roayat Ismail AbdelfatahPublished in: J. King Saud Univ. Comput. Inf. Sci. (2024)
Keyphrases
- authentication scheme
- user authentication
- image encryption
- secret key
- elliptic curve cryptography
- security analysis
- smart card
- image authentication
- mutual authentication
- key management
- public key
- authentication protocol
- high security
- biometric data
- encryption scheme
- security flaws
- security level
- private key
- digital signature
- security properties
- information security
- information systems
- security model
- security requirements
- diffie hellman
- ad hoc networks
- public key cryptography
- feature extraction
- web services