Security Analysis of Various Authentication Schemes Based on Three Types of Digital Signature Schemes
To achieve source authentication, message integrity, and non-repudiation, a number of authentication protocols adopt several types of digital signatures: public-key signatures, identity-based signatures, and certificateless signatures. In this paper, we show that an anonymous remote authentication s...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2018-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8528464/ |