Attainable unconditional security for shared-key cryptosystems.
Fabrizio BiondiThomas Given-WilsonAxel LegayPublished in: Inf. Sci. (2016)
Keyphrases
- private key
- high security
- public key
- cryptographic protocols
- fuzzy vault
- elliptic curve
- security analysis
- signature scheme
- secret key
- secret sharing scheme
- information security
- security threats
- image encryption
- intrusion detection
- security requirements
- database
- authentication protocol
- security systems
- smart card
- secure communication
- access control