Security Analysis of an Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC.
Jinyong ChangBilin ShaoAnling ZhangGenqing BianYanyan JiMaozhi XuPublished in: IEEE Access (2019)
Keyphrases
- security analysis
- null space
- password guessing
- encryption scheme
- smart card
- security requirements
- authentication protocol
- public key
- authentication scheme
- linear discriminant analysis
- standard model
- private key
- cryptographic protocols
- security mechanisms
- user authentication
- rfid tags
- privacy preserving
- singular value decomposition
- discriminative information
- computer vision
- secret key
- data sharing
- watermarking scheme