Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
When using an insecure communication channel, the initial step involves authenticating the user (verifying the other party) to ensure the legitimacy of the communication partner, followed by an encrypted communication. Public key encryption-based digital signatures are widely used for user authentic...
Saved in:
Main Authors: | Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2025-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10829920/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
UCAP:a PCL secure user authentication protocol in cloud computing
by: Xuefeng LI, et al.
Published: (2018-08-01) -
New secure distributed secret sharing scheme of n product
by: Zhen-hua CHEN, et al.
Published: (2014-11-01) -
Advancing Passwordless Authentication: A Systematic Review of Methods, Challenges, and Future Directions for Secure User Identity
by: Mohd Imran Md Yusop, et al.
Published: (2025-01-01) -
Survey on user authentication protocol in wireless sensor network
by: Wei-dong FANG, et al.
Published: (2017-01-01) -
Research on the security of national secret algorithm based compute first networking
by: Jie PAN, et al.
Published: (2023-08-01)