Questioning Key Compromise Attack on Ostad-Sharif et al.'s Authentication and Session key Generation Scheme for Healthcare Applications.
Saru KumariPradeep ChaudharyChien-Ming ChenMuhammad Khurram KhanPublished in: IEEE Access (2019)
Keyphrases
- authentication mechanism
- secure communication
- authentication protocol
- secret key
- private key
- authentication scheme
- key agreement
- high security
- security analysis
- key distribution
- data encryption
- remote user authentication scheme
- information systems
- smart card
- trade off
- image authentication
- secret sharing scheme
- ciphertext
- secret image sharing
- encryption decryption
- public key
- protection scheme
- countermeasures
- wireless local area network
- elliptic curve cryptography
- pseudorandom
- mutual authentication
- standard model
- elliptic curve
- encryption algorithm