Understanding security failures of anonymous authentication schemes for cloud environments.
Meijia XuDing WangQingxuan WangQiaowen JiaPublished in: J. Syst. Archit. (2021)
Keyphrases
- key agreement
- trusted platform module
- security requirements
- security mechanisms
- graphical password
- security properties
- data encryption
- integrity verification
- cloud computing
- security analysis
- trusted computing
- user authentication
- identity authentication
- authentication mechanism
- encryption decryption
- authentication protocol
- electronic payment
- authentication scheme
- digital signature scheme
- public key encryption
- key agreement protocol
- identity management
- security issues
- key distribution
- fuzzy vault
- network security
- factor authentication
- authentication systems
- identity based cryptography
- public key cryptography
- biometric data
- information security
- elliptic curve
- cloud services
- network access
- trust negotiation
- provably secure
- virtual machine
- access control
- payment systems
- virtual private network
- public key infrastructure
- cloud storage
- security services
- intrusion detection
- computing infrastructure
- computer security
- diffie hellman
- security level
- electronic commerce
- peer to peer
- bilinear pairings
- security policies
- secret key
- mutual authentication
- encryption scheme
- security systems
- biometric authentication