2019
DOI: 10.1109/jsyst.2018.2851295
|View full text |Cite
|
Sign up to set email alerts
|

Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
66
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
10

Relationship

5
5

Authors

Journals

citations
Cited by 79 publications
(72 citation statements)
references
References 31 publications
0
66
0
Order By: Relevance
“…. We now demonstrate how our improved scheme achieves the mutual authentication, session key agreement, user anonymity, perfect forward secrecy, and resistance to several attacks [14,[34][35][36][37].…”
Section: Other Discussion On Security Propertiesmentioning
confidence: 91%
“…. We now demonstrate how our improved scheme achieves the mutual authentication, session key agreement, user anonymity, perfect forward secrecy, and resistance to several attacks [14,[34][35][36][37].…”
Section: Other Discussion On Security Propertiesmentioning
confidence: 91%
“…In 2017, Chaudhry et al [22] proposed a protocol using ECC which is privacy preserving and efficient. Sequentially, Feng et al [23] proposed an ideal lattice-based anonymous authentication protocol for mobile devices. The authors claimed that their protocol will be secure in the post-quantum era.…”
Section: Review Of Literaturementioning
confidence: 99%
“…So security attribute is an important index to measure quality of a protocol. e following security attributes are some basic conditions that a secure ID-based 2PAKA protocol needs to meet [26][27][28].…”
Section: Essential Security Attributesmentioning
confidence: 99%