Strongly Secure Multiuser Communication and Authentication With Anonymity Constraints.
Rémi A. ChouAylin YenerPublished in: IEEE Trans. Inf. Theory (2020)
Keyphrases
- secure communication
- trusted third party
- authentication scheme
- user authentication
- identity management
- authentication mechanism
- data encryption
- authentication protocol
- security analysis
- security requirements
- security mechanisms
- anonymous communication
- password authentication
- factor authentication
- security properties
- smart card
- group communication
- security services
- payment systems
- mutual authentication
- integrity verification
- image authentication
- digital signature
- resource constrained
- multi party
- privacy protection
- access control
- public key cryptography
- secret sharing
- incentive mechanism
- key distribution
- encryption decryption
- secret key
- single point of failure
- security issues
- lightweight