Symmetric Authentication Within a Simulatable Cryptographic Library.
Michael BackesBirgit PfitzmannMichael WaidnerPublished in: IACR Cryptol. ePrint Arch. (2003)
Keyphrases
- public key cryptography
- encryption decryption
- smart card
- elliptic curve cryptography
- fuzzy vault
- authentication scheme
- secure communication
- authentication protocol
- cryptographic protocols
- biometric authentication
- public key
- security analysis
- hash functions
- security properties
- security protocols
- elliptic curve
- encryption key
- fragile watermarking
- user authentication
- digital signature
- digital watermarking
- data security
- secret key
- security requirements
- key distribution
- key management