Action-Triggered Public-Key System for GSM Using RSA with Phone-Dependent Encryption.
Rehab K. El NemrImane Aly Saroit IsmailS. H. AhmedPublished in: SECRYPT (2006)
Keyphrases
- public key
- public key cryptography
- digital signature
- private key
- elliptic curve cryptography
- encryption scheme
- security analysis
- secret key
- image authentication
- rfid tags
- security model
- ciphertext
- signature scheme
- secure communication
- provably secure
- public key cryptosystem
- image encryption
- authentication scheme
- key exchange
- end to end
- security properties
- diffie hellman
- blind signature
- public key infrastructure
- standard model
- identity based encryption
- encryption algorithm
- elliptic curve
- blind signature scheme
- high security
- digital watermark
- signcryption scheme
- key management