Explore chapters and articles related to this topic
Certificateless pairing-free authentication scheme for wireless body area network in healthcare management system
Published in Journal of Medical Engineering & Technology, 2020
Philemon Kasyoka, Michael Kimwele, Shem Mbandu Angolo
Proof: We begin with the assumption that an attacker has access to private keys of both application provider and client and has access to value obtained from a past session. The attacker will not be able to compute a valid value since its computed using a random ephemeral key only known to the client