Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
When using an insecure communication channel, the initial step involves authenticating the user (verifying the other party) to ensure the legitimacy of the communication partner, followed by an encrypted communication. Public key encryption-based digital signatures are widely used for user authentic...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2025-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10829920/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!