Secure authentication policy with evidential signature scheme for WLAN.
Yen-Chieh OuyangChing-Tsung HsuehHung-Wei ChenPublished in: Secur. Commun. Networks (2009)
Keyphrases
- signature scheme
- key distribution
- private key
- public key
- standard model
- digital signature scheme
- digital signature
- diffie hellman
- authentication scheme
- authentication protocol
- provably secure
- public key cryptography
- wireless local area network
- security analysis
- chosen message
- secret key
- blind signature
- identity based signature
- secure communication
- security mechanisms
- group communication
- threshold signature scheme
- wireless networks
- designated verifier
- public key cryptosystem
- bilinear pairings
- authentication mechanism
- group signature scheme
- user authentication
- access control policies
- key agreement protocol
- hash functions
- key management
- identity management
- security issues
- blind signature scheme
- trusted third party
- factor authentication
- identity based cryptography
- security requirements
- signcryption scheme
- access points
- encryption scheme