There Can Be No Compromise: The Necessity of Ratcheted Authentication in Secure Messaging.
Benjamin DowlingBritta HalePublished in: IACR Cryptol. ePrint Arch. (2020)
Keyphrases
- authentication mechanism
- user authentication
- authentication scheme
- password authentication
- data encryption
- identity management
- authentication protocol
- security mechanisms
- factor authentication
- key distribution
- integrity verification
- security analysis
- secure manner
- security requirements
- fault tolerant
- private key
- rights management
- identity authentication
- secure communication
- secret key
- security services
- smart card
- public key cryptography
- public key
- key agreement protocol
- trade off
- key agreement
- trusted third party
- key management
- public key infrastructure
- key exchange
- lightweight
- resource constrained
- authentication systems
- key exchange protocol
- elliptic curve cryptography
- image authentication
- mutual authentication
- biometric authentication
- digital signature
- elliptic curve
- information sharing
- electronic payment
- publish subscribe
- secret sharing scheme
- digital watermarking
- cloud computing