A simple protocol for deniable authentication based on ElGamal cryptography.
Yingjie WangJianhua LiLing TiePublished in: Networks (2005)
Keyphrases
- authentication protocol
- smart card
- security analysis
- cryptographic protocols
- public key
- lightweight
- authentication scheme
- user authentication
- key distribution
- information security
- rfid tags
- secret key
- security protocols
- mutual authentication
- password authentication
- public key cryptography
- low cost
- hash functions
- cost effective
- cellular automata
- elliptic curve cryptography
- real time