Exchanging Keys with Authentication and Identity Protection for Secure Voice Communication without Side-channel.
Piotr KrasnowskiJérôme LebrunBruno MartinPublished in: CoRR (2022)
Keyphrases
- secret key
- secure communication
- identity management
- security level
- biometric data
- authentication scheme
- session key
- smart card
- key distribution
- private key
- key agreement
- authentication protocol
- encryption decryption
- diffie hellman
- information security
- security mechanisms
- user authentication
- public key
- access control
- group communication
- password authentication
- security analysis
- key management
- security requirements
- security architecture
- personal information
- key exchange protocol
- authentication mechanism
- resource constrained
- data encryption
- key agreement protocol
- digital signature
- cloud computing
- integrity verification
- countermeasures
- individual privacy
- communication systems
- identity verification
- encryption scheme
- data confidentiality
- signature scheme
- multi party
- biometric authentication
- factor authentication
- previously mentioned
- mutual authentication
- security services
- lightweight
- secure manner
- data protection
- critical infrastructure