A secure authentication protocol for multi-server-based e-healthcare using a fuzzy commitment scheme

S Barman, HPH Shum, S Chattopadhyay… - IEEE …, 2019 - ieeexplore.ieee.org
… In this paper, the fuzzy commitment scheme is used to design a remote authentication and
key … We apply the fuzzy commitment scheme in order to strengthen our scheme. The error …

Provably secure multi-server authentication protocol using fuzzy commitment

S Barman, AK Das, D Samanta, S Chattopadhyay… - IEEE …, 2018 - ieeexplore.ieee.org
… one way hash function, revocable template generation, error correction coding and fuzzy
commitment scheme that are needed to describe and analyze the proposed scheme. …

A new authentication protocol for an Authentication-as-a-Service (AaaS) cloud using Pedersen commitment scheme

A Ibrahim, M Singhal - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
… that provides strong mutual authentication among communicating parties. It implements a
new authentication protocol we developed using the Pedersen commitment scheme, which …

A secure and improved multi server authentication protocol using fuzzy commitment

HU Rehman, A Ghani, SA Chaudhry… - Multimedia Tools and …, 2021 - Springer
… biometrics-based authentication protocol and claimed their protocol provides security …
authentication protocol using only symmetric cryptography operations and fuzzy commitment

Commitment and authentication systems

A Pinto, A Souto, A Matos, L Antunes - … , ICITS 2007, Madrid, Spain, May 25 …, 2009 - Springer
commitment scheme and show that such a scheme is a resolvable design commitment scheme
as … optimal systems must be resolvable design commitment schemes and that all of these …

A fuzzy commitment scheme

A Juels, M Wattenberg - Proceedings of the 6th ACM conference on …, 1999 - dl.acm.org
authentication. Note as mentioned above, however, that in the first authentication protocol,
the committed … as to achieve a sufficiently high level of security in the authentication scheme. …

[PDF][PDF] Double layer cryptographic protocol for mobile ad-hoc networks (MANETs) by commitment scheme

V Shukla, A Chaturvedi, N Srivastava - Communications on applied …, 2017 - academia.edu
… A commitment scheme has two essential properties binding and … execution in an ideal
commitment scheme, the receiver … our protocol has the special property of commitment scheme

A novel commitment-based authentication protocol based on AAA architecture for mobile IP networks

H Jing, J Li, K Yang, HH Chen - 2007 IEEE Wireless …, 2007 - ieeexplore.ieee.org
… If the employed commitment scheme is correct, at the end of the protocol we must have m
= … of authentication, we propose the new authentication protocol by commitment schemes. …

An optimal non-interactive message authentication protocol

S Pasini, S Vaudenay - Cryptographers' Track at the RSA Conference, 2006 - Springer
authenticated bits and without requiring the hash function to be collision-resistant. Our protocol
is based on a trapdoor commitment scheme … introduce keyed commitment schemes which …

A new family of authentication protocols

R Anderson, F Bergadano, B Crispo, JH Lee… - ACM SIGOPS …, 1998 - dl.acm.org
… The basic idea is that, at each round of the protocol, we firstly commit to a string consisting
of (codeword, message, [hash of next codeword]) by publishing a hash of it. This commitment