Rogue Public Key Registration Attack and the Importance of 'Proof of Possession' in the PKI Environment.
Younho LeeYongsu ParkHeeyoul KimSeong-Min HongHyunsoo YoonPublished in: IEICE Trans. Inf. Syst. (2006)
Keyphrases
- public key
- secret key
- authentication protocol
- security analysis
- security model
- public key infrastructure
- public key cryptography
- digital signature
- ciphertext
- signature scheme
- image authentication
- session key
- private key
- secure communication
- authentication scheme
- diffie hellman
- blind signature scheme
- public key cryptosystem
- elliptic curve cryptography
- real time
- provably secure
- public key encryption
- blind signature
- rfid tags