An Anonymous Authentication Protocol Based on Blind Signature for Internet of Things.
Yue ZhaoBin YangYarang YangPublished in: ICMLC (2024)
Keyphrases
- authentication protocol
- blind signature
- public key
- blind signature scheme
- digital signature
- smart card
- security analysis
- signature scheme
- provably secure
- secret key
- key technologies
- security model
- hash functions
- diffie hellman
- peer to peer
- rfid tags
- key distribution
- secure communication
- cryptographic protocols
- trusted third party
- rfid technology
- private key
- lightweight
- real time
- security mechanisms
- operating system