ECC-Based Non-Interactive Deniable Authentication with Designated Verifier.
Yalin ChenJue-Sam ChouPublished in: IACR Cryptol. ePrint Arch. (2013)
Keyphrases
- authentication protocol
- designated verifier
- security analysis
- public key
- signature scheme
- security model
- signcryption scheme
- smart card
- key distribution
- secret key
- lightweight
- public key cryptography
- security requirements
- rfid tags
- security properties
- hash functions
- cryptographic protocols
- security protocols
- real time
- encryption scheme