On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing.
Salman ShamshadMinahil RanaKhalid MahmoodMuhammad Khurram KhanMohammad S. ObaidatPublished in: Wirel. Pers. Commun. (2022)
Keyphrases
- key distribution
- digital signature scheme
- signature scheme
- identity based signature
- identity based cryptography
- key management
- private key
- key agreement
- standard model
- authentication protocol
- authentication mechanism
- diffie hellman
- signcryption scheme
- key agreement protocol
- public key
- security analysis
- authentication scheme
- secret key
- provably secure
- encryption scheme
- public key cryptography
- key management scheme
- trusted platform module
- mutual authentication
- authentication and key agreement
- digital signature
- session key
- security protocols
- factor authentication
- elliptic curve
- blind signature
- public key encryption
- blind signature scheme
- secure communication
- bilinear pairings
- key exchange
- secret sharing scheme
- smart card
- security requirements
- security services
- security properties
- elliptic curve cryptography
- wireless sensor networks
- public key cryptosystem
- ad hoc networks
- trusted computing
- data encryption
- resource constrained
- security level
- mobile commerce
- graphical password
- security mechanisms
- security model
- trusted third party
- key exchange protocol
- password authentication
- integrity verification
- cca secure
- hash functions
- computing environments
- computing platform
- security issues
- high security
- rights management
- payment systems
- user authentication