Cryptanalysis of an Efficient Deniable Authentication Protocol Based on Generalized ElGamal Signature Scheme.
Chi-Yu LiuCheng-Chi LeeTzu-Chun LinPublished in: Int. J. Netw. Secur. (2011)
Keyphrases
- authentication protocol
- signature scheme
- public key
- secret key
- security analysis
- standard model
- hash functions
- digital signature
- authentication scheme
- key distribution
- diffie hellman
- smart card
- secure communication
- private key
- cryptographic protocols
- user authentication
- rfid tags
- information sharing
- feature space
- similarity measure
- real time