A public-key based authentication and key establishment protocol coupled with a client puzzle.
M. C. LeeChun-Kan FungPublished in: J. Assoc. Inf. Sci. Technol. (2003)
Keyphrases
- public key
- symmetric key
- public key cryptography
- security analysis
- diffie hellman
- image authentication
- private key
- authentication protocol
- encryption scheme
- security model
- authentication scheme
- secure communication
- elliptic curve cryptography
- secret key
- signature scheme
- digital signature
- client server
- public key infrastructure
- standard model
- key distribution
- security properties
- encryption algorithm
- rfid tags
- power consumption
- privacy preserving
- operating system
- lightweight