Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs.
Vadim LyubashevskyDaniel MasnyPublished in: IACR Cryptol. ePrint Arch. (2013)
Keyphrases
- key agreement
- authentication scheme
- public key encryption
- user authentication
- authentication mechanism
- authentication protocol
- password authentication
- data encryption
- identity management
- security analysis
- factor authentication
- key distribution
- graphical password
- security mechanisms
- security requirements
- integrity verification
- key management scheme
- secret key
- secure manner
- diffie hellman
- provably secure
- security properties
- elliptic curve
- security services
- key management
- smart card
- public key cryptography
- mutual authentication
- secure communication
- standard model
- public key infrastructure
- key agreement protocol
- rights management
- private key
- cryptographic protocols
- electronic payment
- public key
- image authentication
- encryption decryption
- wireless sensor networks
- security level
- digital signature
- security protocols
- encryption scheme
- resource constrained
- information sharing