On security of a more efficient and secure dynamic ID-based remote user authentication scheme.
Cheng-Chi LeeChin-Ling ChenChun-Ta LiRui-Xiang ChangPublished in: ISDA (2010)
Keyphrases
- provably secure
- remote user authentication scheme
- user authentication
- smart card
- diffie hellman
- key management
- security requirements
- security issues
- encryption scheme
- key distribution
- security model
- blind signature
- security mechanisms
- key agreement
- security analysis
- standard model
- public key
- password guessing
- cost effective
- security management
- key agreement protocol
- intrusion detection
- security measures
- security properties
- security level
- access control
- data encryption
- electronic voting
- lightweight
- public key cryptography
- authentication scheme
- cryptographic protocols
- signature scheme
- security policies
- authentication protocol