Some definitions, protocols and proofs about secure authentication.
Charles RackoffPublished in: CASCON (1992)
Keyphrases
- authentication protocol
- key distribution
- security services
- key agreement protocol
- security protocols
- key management
- user authentication
- password authentication
- security analysis
- authentication scheme
- mutual authentication
- smart card
- session key
- cryptographic protocols
- authentication mechanism
- trusted third party
- public key
- secret key
- key exchange
- integrity verification
- security mechanisms
- diffie hellman
- group communication
- lightweight
- factor authentication
- security properties
- identity management
- private key
- rfid tags
- security requirements
- key agreement
- data encryption
- public key cryptography
- secure manner
- secure multiparty computation
- secure communication
- theorem proving
- theorem prover
- key establishment
- privacy protection
- public key infrastructure
- signature scheme
- application level
- encryption decryption
- identity authentication
- elliptic curve
- biometric authentication
- wireless sensor networks