Login / Signup
Zero Knowledge Proof based authentication protocol using graph isomorphism.
Lavish Saluja
Ashutosh Bhatia
Published in:
CoRR (2019)
Keyphrases
</>
authentication protocol
graph isomorphism
smart card
graph mining
public key
security analysis
lightweight
subgraph isomorphism
security protocols
graph databases
graph search
rfid tags
hash functions
graph data
secret key
data structure
np hard
data streams