Secret Key-Based Identification and Authentication With a Privacy Constraint.
Kittipong KittichokechaiGiuseppe CairePublished in: IEEE Trans. Inf. Theory (2016)
Keyphrases
- secret key
- authentication protocol
- mutual authentication
- authentication scheme
- smart card
- encryption decryption
- key distribution
- session key
- secure communication
- public key
- pseudorandom
- user authentication
- key agreement
- key management
- hash functions
- security analysis
- security mechanisms
- private key
- stream cipher
- security level
- rfid systems
- ciphertext
- diffie hellman
- personal information
- identity management
- trusted third party
- rfid tags
- encryption scheme
- cryptographic protocols
- security protocols
- privacy preserving
- public key cryptography
- privacy protection
- security services
- block cipher
- data sets