Secret key-based authentication with a privacy constraint.
Kittipong KittichokechaiGiuseppe CairePublished in: ISIT (2015)
Keyphrases
- secret key
- authentication protocol
- mutual authentication
- authentication scheme
- smart card
- encryption decryption
- key distribution
- public key
- secure communication
- pseudorandom
- session key
- key agreement
- user authentication
- key management
- security analysis
- security mechanisms
- encryption scheme
- rfid systems
- hash functions
- private key
- security properties
- stream cipher
- real time
- security level
- rfid tags
- ciphertext
- trusted third party
- security services
- identity management
- lightweight
- privacy preserving
- security issues
- signature scheme
- personal information
- diffie hellman
- public key cryptography
- image authentication
- security protocols
- security requirements
- cryptographic protocols
- database systems