Secret Sharing Schemes Based Secure Authentication for Physical Unclonable Function.
Yusuke NozakiMasaya YoshikawaPublished in: ICCCS (2019)
Keyphrases
- secret sharing scheme
- authentication mechanism
- secret sharing
- key management
- private key
- key distribution
- user authentication
- security analysis
- authentication protocol
- data encryption
- identity management
- security mechanisms
- encryption scheme
- security requirements
- authentication scheme
- integrity verification
- multiresolution
- factor authentication
- security protocols
- ad hoc networks
- wireless sensor networks