An efficient two-factor authentication protocol based on elliptic curve cryptosystem with provable security.
Yulei ChenJianhua ChenPublished in: Trans. Emerg. Telecommun. Technol. (2022)
Keyphrases
- elliptic curve
- authentication protocol
- key management
- security protocols
- scalar multiplication
- elliptic curve cryptography
- smart card
- diffie hellman
- key distribution
- security analysis
- public key cryptography
- digital signature
- secret key
- key agreement
- public key
- rfid tags
- authentication scheme
- lightweight
- mutual authentication
- efficient computation
- rfid systems
- user authentication
- cryptographic protocols
- security properties
- private key
- wireless sensor networks
- group communication
- secret sharing scheme
- security requirements
- security mechanisms
- power analysis
- intrusion detection
- distributed systems
- web services
- public key cryptosystems