Secure Verifier-Based Three-Party Authentication Schemes without Server Public Keys for Data Exchange in Telecare Medicine Information Systems.
Tsung-Hung LinTian-Fu LeePublished in: J. Medical Syst. (2014)
Keyphrases
- data exchange
- key agreement
- information systems
- session key
- secret key
- authentication protocol
- authentication mechanism
- diffie hellman
- security properties
- mutual authentication
- public key
- authentication scheme
- query answering
- key agreement protocol
- elliptic curve
- data integration
- schema mappings
- private key
- security analysis
- key distribution
- user authentication
- data management
- secure communication
- lingua franca
- data encryption
- provably secure
- health information
- database
- smart card
- security requirements
- signature scheme
- security model
- hash functions
- cryptographic protocols
- standard model
- mobile terminals
- data model
- data mining
- security protocols
- identity management
- key management
- trust relationships
- encryption scheme
- trusted third party
- conjunctive queries
- data complexity
- rfid tags
- xml schema
- key management scheme
- information security
- databases