Keyphrases
- authentication protocol
- security analysis
- secret key
- public key
- smart card
- hash functions
- authentication scheme
- user authentication
- signature scheme
- key distribution
- cryptographic protocols
- security requirements
- mutual authentication
- encryption scheme
- session key
- password authentication
- security protocols
- key management
- rfid tags
- cloud computing
- private key
- secure communication
- security properties
- diffie hellman
- key exchange
- lightweight
- ciphertext
- elliptic curve
- similarity search
- knn
- encryption algorithm
- software architecture
- low cost