A provably secure delegated authentication scheme and its applications.
Qun LinJianzhong LiXuechang RenPublished in: Int. J. Embed. Syst. (2019)
Keyphrases
- authentication scheme
- provably secure
- public key
- key management
- secret key
- security model
- security analysis
- diffie hellman
- signature scheme
- distributed environment
- public key cryptography
- blind signature scheme
- blind signature
- smart card
- hash functions
- standard model
- resource constrained
- encryption scheme
- digital signature
- secure communication
- authentication protocol
- key distribution
- ad hoc networks
- wireless sensor networks
- private key
- bilinear pairings
- group communication
- user authentication
- secret sharing scheme
- elliptic curve
- peer to peer
- information systems
- security protocols
- rfid tags
- distributed systems
- real time