Deniable authentication for multi-party protocol
Deniable authentication can authenticate messages like digital signatures,and its non-public verification can meet many requirements that cannot be met by signatures,such as privacy preservation.How to achieve deni-able authentication with multi-party protocol was the study aim.A deniable authentica...
Saved in:
Main Authors: | Yong CHEN, Long LU, Sheng-ke ZENG, Ming-xing HE |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2016-06-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00059 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Multi-parties key agreement protocol based on elliptic curve
by: Long GAO, et al.
Published: (2016-05-01) -
Rational analysis of authentication protocols based on NGUYEN L H scheme
by: Xing-hua LI, et al.
Published: (2013-08-01) -
Smart Home Security: An Efficient Multi-Factor Authentication Protocol
by: Ghazaleh Sarbishaei, et al.
Published: (2024-01-01) -
Password-based three-party authenticated key exchange protocol from lattices
by: Jinxia YU, et al.
Published: (2018-11-01) -
Post-quantum verifier-based three-party password authenticated key exchange protocol
by: Huanhuan LIAN, et al.
Published: (2022-04-01)