Multi-Designated Receiver Authentication-Codes with Information-Theoretic Security.
Takenobu SeitoJunji ShikataYohei WatanabePublished in: CISS (2022)
Keyphrases
- information theoretic
- factor authentication
- information theory
- mutual information
- security mechanisms
- security requirements
- identity authentication
- fuzzy vault
- theoretic framework
- integrity verification
- security analysis
- user authentication
- data encryption
- authentication mechanism
- authentication protocol
- jensen shannon divergence
- access control
- information theoretic measures
- security services
- information bottleneck
- authentication scheme
- multi modality
- smart card
- authentication systems
- log likelihood
- biometric data
- kullback leibler divergence
- information security
- relative entropy
- security issues
- distributional clustering
- virtual private network
- entropy measure
- physical layer
- graphical password
- key distribution
- computational learning theory
- security protocols
- key management
- encryption scheme
- text classification
- probabilistic model