A Secure and Privacy-Friendly Logging Scheme.
Andreas AßmuthRobert DuncanSimon LieblMatthias SöllnerPublished in: CoRR (2024)
Keyphrases
- authentication protocol
- security issues
- encryption key
- mutual authentication
- authentication scheme
- identity management
- security properties
- security mechanisms
- privacy preserving
- trusted third party
- data security
- secure communication
- sensitive data
- key agreement
- security analysis
- horizontally partitioned data
- key distribution
- privacy protection
- homomorphic encryption
- personal information
- security measures
- secret sharing
- public key encryption
- differential privacy
- chosen plaintext
- wireless sensor networks
- key management scheme
- sensitive information
- data confidentiality
- security services
- rfid systems
- private information
- data protection
- security requirements
- standard model
- privacy preservation