Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
When using an insecure communication channel, the initial step involves authenticating the user (verifying the other party) to ensure the legitimacy of the communication partner, followed by an encrypted communication. Public key encryption-based digital signatures are widely used for user authentic...
Saved in:
Main Authors: | Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2025-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10829920/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Advance Sharing Procedures for the Ramp Quantum Secret Sharing Schemes With the Highest Coding Rate
by: Ryutaroh Matsumoto
Published: (2025-01-01) -
Secure channel estimation model for cognitive radio network physical layer security using two-level shared key authentication
by: K. Saravanan, et al.
Published: (2025-01-01) -
Advancing Passwordless Authentication: A Systematic Review of Methods, Challenges, and Future Directions for Secure User Identity
by: Mohd Imran Md Yusop, et al.
Published: (2025-01-01) -
RAM-MEN: Robust authentication mechanism for IoT-enabled edge networks
by: Muhammad Tanveer, et al.
Published: (2025-01-01) -
A Verifiable and Secure Industrial IoT Data Deduplication Scheme With Real-Time Data Integrity Checking in Fog-Assisted Cloud Environments
by: Jakkarin Lapmoon, et al.
Published: (2025-01-01)