Secure protocol with variable security level using secret sharing scheme.
Shohei UenoAtsushi KanaiShigeaki TanimotoHiroyuki SatoPublished in: GCCE (2015)
Keyphrases
- security level
- secret sharing scheme
- secret key
- key management
- key distribution
- secret sharing
- authentication protocol
- encryption scheme
- security protocols
- mutual authentication
- information security
- multi party
- elliptic curve
- smart card
- authentication scheme
- biometric data
- authentication mechanism
- security analysis
- secret image
- public key
- visual cryptography scheme
- black and white
- rfid tags
- wireless sensor networks
- resource constrained
- lightweight
- hash functions
- end to end
- data integration
- low cost