Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification.
Xu An WangJian WengJianfeng MaXiaoyuan YangPublished in: Inf. Sci. (2019)
Keyphrases
- multi user
- authentication protocol
- secret key
- hash functions
- smart card
- outsourced databases
- virtual environment
- public key
- security analysis
- virtual world
- multi granularity
- user interface
- lightweight
- single user
- augmented reality
- multiple users
- security protocols
- rfid tags
- third party
- virtual reality
- signature scheme
- database systems
- data sets
- real time
- data distribution
- low cost
- high dimensional
- expert systems
- databases