An Improved Identity-Based Anonymous Authentication Scheme Resistant to Semi-Trusted Server Attacks.
Dong XieJinghua YangWeixin BianFulong ChenTaochun WangPublished in: IEEE Internet Things J. (2023)
Keyphrases
- authentication scheme
- security flaws
- authentication protocol
- key management
- security protocols
- key distribution
- secret key
- smart card
- public key
- signature scheme
- security analysis
- user authentication
- encryption scheme
- image encryption
- password guessing
- cryptographic protocols
- elliptic curve cryptography
- web services
- security mechanisms
- ad hoc networks
- lightweight
- resource constrained
- wireless sensor networks
- blind signature scheme
- security properties
- wireless networks
- secret sharing scheme
- digital signature
- diffie hellman
- signcryption scheme
- rfid tags
- peer to peer
- image authentication
- digital images
- provably secure
- ciphertext