Attacks to Some Recently Proposed CL-SC Schemes and Presenting a Secure Scheme with KSSTIS.
Parvin RastegariPublished in: ISC Int. J. Inf. Secur. (2022)
Keyphrases
- password guessing
- user authentication
- chosen plaintext
- key management scheme
- smart card
- authentication scheme
- remote user authentication scheme
- key agreement
- public key encryption
- security analysis
- protection schemes
- provably secure
- security protocols
- key management
- secure communication
- cryptographic protocols
- security flaws
- chosen message
- cryptographic algorithms
- diffie hellman
- secret sharing
- authentication protocol
- security properties
- security mechanisms
- wireless sensor networks
- secure routing
- secret sharing scheme
- stream cipher
- graphical password
- data encryption
- standard model
- elliptic curve
- key agreement protocol
- security threats
- key exchange
- secret key
- block cipher
- access control
- authentication mechanism
- private key
- blind signature
- public key cryptography
- security measures