On "the Power of Verification Queries" in Unconditionally Secure Message Authentication.
Dongvu TonienReihaneh Safavi-NainiPeter R. WildPublished in: Discret. Math. Algorithms Appl. (2011)
Keyphrases
- message authentication codes
- public key
- integrity verification
- image authentication
- noisy channel
- security level
- security analysis
- authentication scheme
- query language
- query processing
- high security
- authentication mechanism
- data encryption
- authentication protocol
- factor authentication
- user authentication
- security mechanisms
- security model
- power consumption
- response time
- identity management
- range queries
- web search engines
- security requirements
- password authentication
- query evaluation
- public key cryptography
- user queries
- key distribution
- private key
- cryptographic protocols
- security services
- diffie hellman
- model checking
- smart card
- information security
- security issues
- data sources
- secure manner
- signature scheme
- encryption decryption
- signature verification
- public key infrastructure
- digital signature
- multimodal biometrics
- provably secure