A provably secure, lightweight protocol for anonymous authentication
From MaRDI portal
Publication:6134822
DOI10.1007/978-3-031-14791-3_12zbMATH Open1518.94116MaRDI QIDQ6134822FDOQ6134822
Authors:
Publication date: 25 July 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Recommendations
- Lightweight anonymous authentication for ad hoc group: a ring signature approach
- Lightweight privacy preserving authentication for RFID using a stream cipher
- Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
- Towards a lightweight, secure, and untraceable RFID authentication protocol
- Traceable Privacy of Recent Provably-Secure RFID Protocols
Cites Work
Cited In (20)
- An efficient RFID anonymous batch authentication protocol based on group signature
- Title not available (Why is that?)
- Attack against a pairing based anonymous authentication protocol
- Efficient RFID authentication protocols based on pseudorandom sequence generators
- Title not available (Why is that?)
- A protocol for provably secure authentication of a tiny entity to a high performance computing one
- An enhanced anonymous ECC-based authentication for lightweight application in TMIS
- Authentication protocols for reliable information provision systems with low computational-ability devices
- An efficient non-interactive deniable authentication protocol with anonymous sender protection
- Towards lightweight anonymous entity authentication for IoT applications
- Desynchronization attack on RAPP ultralightweight authentication protocol
- Towards a lightweight, secure, and untraceable RFID authentication protocol
- A simple protocol for deniable authentication based on ElGamal cryptography
- A secure and efficient authentication protocol for anonymous channel in wireless communications
- Security proof of Molnar protocol
- Concrete Security for Entity Recognition: The Jane Doe Protocol
- Lightweight anonymous authentication for ad hoc group: a ring signature approach
- Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity
- Lightweight privacy preserving authentication for RFID using a stream cipher
- Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
This page was built for publication: A provably secure, lightweight protocol for anonymous authentication
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6134822)