Secure Fingerprinting Using Public-Key Cryptography (Transcript of Discussion).
Ryôichi SasakiPublished in: Security Protocols Workshop (1998)
Keyphrases
- public key cryptography
- public key
- provably secure
- security services
- digital signature
- elliptic curve
- public key infrastructure
- security model
- authentication and key agreement
- security analysis
- elliptic curve cryptography
- authentication scheme
- key management
- bilinear pairings
- authentication protocol
- private key
- diffie hellman
- government services
- smart card