An Novel Anonymous Authenticated and Key Exchange Protocol


Because of the growing importance in the fields of computer networks, how to keep user's privacy has drawn more and more concerns in recent years. In this paper, we first point out that the two given anonymous password-based authenticated and key exchange protocols are vulnerable to the anonymity attack. Then based on a ring signature scheme, we propose a… (More)
DOI: 10.4304/jnw.4.10.985-992


Figures and Tables

Sorry, we couldn't extract any figures or tables for this paper.

Slides referencing similar topics