A new key authentication scheme for cryptosystems based on discrete logarithms.
Zuhua ShaoPublished in: Appl. Math. Comput. (2005)
Keyphrases
- authentication scheme
- secret key
- private key
- secure communication
- public key
- image encryption
- smart card
- high security
- user authentication
- security flaws
- authentication protocol
- elliptic curve cryptography
- key distribution
- image authentication
- web services
- hash functions
- digital signature
- key management
- encryption scheme
- operating system