Applications of Timed-Release Encryption with Implicit Authentication.
Angelique Faye LoeLiam MedleyChristian O'ConnellElizabeth A. QuagliaPublished in: AFRICACRYPT (2023)
Keyphrases
- encryption decryption
- identity authentication
- data encryption
- public key cryptography
- integrity verification
- image authentication
- security analysis
- virtual private network
- elliptic curve cryptography
- petri net
- public key
- authentication mechanism
- secret key
- mutual authentication
- private key
- encryption algorithms
- digital signature
- data security
- biometric authentication
- high security
- public key infrastructure
- security requirements
- image encryption
- security services
- authentication scheme
- user authentication
- key distribution
- provably secure
- secure communication
- biometric data
- encryption algorithm
- ciphertext
- factor authentication
- copyright protection
- fragile watermarking