Security Analysis of Various Authentication Schemes Based on Three Types of Digital Signature Schemes

To achieve source authentication, message integrity, and non-repudiation, a number of authentication protocols adopt several types of digital signatures: public-key signatures, identity-based signatures, and certificateless signatures. In this paper, we show that an anonymous remote authentication s...

Full description

Bibliographic Details
Main Author: Kyung-Ah Shim
Format: Article
Language:English
Published: IEEE 2018-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8528464/