Privacy Amplification Strategies in Sequential Secret Key Distillation Protocols Based on Machine Learning.
Jelica RadomirovicMilan MilosavljevicBranko D. KovacevicMilos JovanovicPublished in: Symmetry (2022)
Keyphrases
- secret key
- authentication protocol
- machine learning
- mutual authentication
- key distribution
- session key
- smart card
- key establishment
- public key
- authentication scheme
- pseudorandom
- security analysis
- secure communication
- stream cipher
- encryption scheme
- key management
- cryptographic protocols
- security level
- data mining
- trusted third party
- diffie hellman
- private information
- privacy preserving
- rfid systems
- security protocols
- feature selection
- user authentication
- ciphertext
- security properties
- digital signature
- group communication
- information security
- rfid tags
- nearest neighbor
- security issues