Strengthening the Security of Deniable Authentication Scheme Using Zero-Knowledge Proof.
Ari Moesriami BarmawiAsep Rizal NurjamanPublished in: ICCNS (2021)
Keyphrases
- authentication protocol
- authentication scheme
- smart card
- user authentication
- security analysis
- security protocols
- lightweight
- public key
- elliptic curve cryptography
- secret key
- rfid tags
- image encryption
- cryptographic protocols
- security flaws
- mutual authentication
- information security
- security requirements
- real time
- end to end
- key agreement
- security mechanisms
- hash functions