A Strong ECC Based on Secure Authentication with Privacy for IoT Concepts: Using Fuzzy Extractor.
Sebbah AbderrezzakBenamar KadriPublished in: Int. J. Technol. Diffusion (2022)
Keyphrases
- identity management
- security analysis
- authentication protocol
- security mechanisms
- mutual authentication
- security services
- electronic payment
- elliptic curve cryptography
- authentication scheme
- security issues
- cloud computing
- rfid systems
- security properties
- user authentication
- public key cryptography
- smart card
- personal information
- authentication mechanism
- trusted third party
- security requirements
- key management
- public key
- fuzzy logic
- data encryption
- high security
- management system
- access control
- fuzzy sets
- key distribution
- secure manner
- key agreement
- privacy preserving
- resource constrained
- password authentication
- data security
- fuzzy ontology
- security model
- integrity verification
- homomorphic encryption
- privacy concerns
- user privacy
- elliptic curve
- cryptographic protocols
- privacy protection
- rfid tags
- data privacy
- biometric template
- lightweight
- security protocols
- secure communication
- factor authentication