An Efficient ID-Based Mutual Authentication Secure against Privileged-Insider Attack.
Song Yi KimHyoseung KimDong Hoon LeePublished in: ICITCS (2015)
Keyphrases
- key agreement
- mutual authentication
- authentication mechanism
- security analysis
- secret key
- authentication protocol
- public key
- privacy protection
- key distribution
- authentication scheme
- diffie hellman
- security properties
- rfid tags
- private key
- smart card
- data encryption
- signature scheme
- elliptic curve
- encryption scheme
- key agreement protocol
- trusted third party
- security model
- security requirements
- key management
- sensitive data
- encryption algorithm
- lightweight
- rfid systems
- secure communication
- privacy preserving
- cryptographic protocols
- user authentication
- security services