Unconditionally Secure Anonymous Encryption and Group Authentication.
Goichiro HanaokaJunji ShikataYumiko HanaokaHideki ImaiPublished in: Comput. J. (2006)
Keyphrases
- data encryption
- integrity verification
- security analysis
- encryption decryption
- public key cryptography
- authentication mechanism
- authentication scheme
- identity authentication
- mutual authentication
- private key
- key exchange
- trusted platform module
- user authentication
- security properties
- authentication protocol
- public key
- security mechanisms
- image encryption
- key distribution
- key management
- encryption scheme
- secret key
- identity management
- electronic payment
- security requirements
- password authentication
- high security
- digital signature
- secure communication
- public key infrastructure
- cryptographic protocols
- security services
- stream cipher
- encryption algorithms
- elliptic curve cryptography
- image authentication
- data security
- factor authentication
- digital signature scheme
- encryption algorithm
- mobile commerce
- rights management
- secure manner
- biometric authentication
- payment systems
- trusted third party
- access control
- security issues
- smart card
- data protection
- advanced encryption standard
- secret sharing scheme
- ciphertext
- information hiding
- elliptic curve
- rfid tags