A Novel ID-Based Authentication and Key Exchange Protocol Resistant to Ephemeral-Secret-Leakage Attacks for Mobile Devices.
Yuh-Min TsengSen-Shan HuangTung-Tso TsaiLi TsengPublished in: Int. J. Distributed Sens. Networks (2015)
Keyphrases
- diffie hellman
- key exchange protocol
- secret key
- mobile devices
- password authentication
- secure communication
- key distribution
- authentication scheme
- security mechanisms
- smart card
- public key
- authentication protocol
- secret sharing
- security protocols
- key agreement protocol
- key exchange
- key management
- encryption scheme
- secret sharing scheme
- image authentication
- security analysis
- private key
- cryptographic protocols
- provably secure
- security requirements
- signature scheme
- security properties
- standard model
- elliptic curve
- group communication
- bilinear pairings
- user authentication
- watermarking scheme
- security issues
- security model
- digital watermarking
- ciphertext
- rfid tags
- hash functions
- image quality
- watermarking technique
- watermarking algorithm
- ad hoc networks
- access control
- low cost
- digital images
- sensor networks