Identity-based Conditional Privacy-Preserving Authentication Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret.
Patryk KozielLukasz KrzywieckiDamian StygarPublished in: ICETE (2) (2019)
Keyphrases
- privacy preserving
- authentication scheme
- secret key
- key management
- key distribution
- encryption scheme
- signature scheme
- ciphertext
- smart card
- public key
- secret sharing scheme
- privacy preserving data mining
- vertically partitioned data
- privacy preservation
- user authentication
- multi party
- security analysis
- authentication protocol
- sensitive information
- privacy concerns
- signcryption scheme
- private information
- provably secure
- standard model
- privacy protection
- secure multiparty computation
- differential privacy
- semi honest
- data mining
- cost effective