Secret Key-Enabled Authenticated-Capacity Region, Part - II: Typical-Authentication.
Eric GravesJake B. PerazzonePaul L. YuRick S. BlumPublished in: IEEE Trans. Inf. Theory (2022)
Keyphrases
- secret key
- authentication scheme
- key distribution
- session key
- smart card
- encryption decryption
- secure communication
- public key
- key management
- authentication protocol
- image authentication
- pseudorandom
- group communication
- user authentication
- security level
- private key
- diffie hellman
- hash functions
- secret data
- key exchange protocol
- key exchange
- mutual authentication
- stream cipher
- key agreement
- security requirements
- key agreement protocol
- provably secure
- signature scheme
- digital signature
- data points