Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation

When using an insecure communication channel, the initial step involves authenticating the user (verifying the other party) to ensure the legitimacy of the communication partner, followed by an encrypted communication. Public key encryption-based digital signatures are widely used for user authentic...

Full description

Saved in:
Bibliographic Details
Main Authors: Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal
Format: Article
Language:English
Published: IEEE 2025-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10829920/
Tags: Add Tag
No Tags, Be the first to tag this record!