On the Algorithmic Computability of the Secret Key and Authentication Capacity Under Channel, Storage, and Privacy Leakage Constraints.
Holger BocheRafael F. SchaeferSebastian BaurH. Vincent PoorPublished in: IEEE Trans. Signal Process. (2019)
Keyphrases
- secret key
- authentication protocol
- authentication scheme
- mutual authentication
- smart card
- encryption decryption
- key distribution
- secure communication
- session key
- public key
- private key
- security mechanisms
- security analysis
- user authentication
- key management
- identity management
- stream cipher
- security level
- key agreement
- pseudorandom
- privacy preserving
- encryption scheme
- high capacity
- diffie hellman
- security protocols
- lightweight
- secret data
- rfid tags
- database management systems
- hash functions
- private information
- trusted third party
- public key cryptography
- signature scheme
- rfid systems
- cryptographic protocols