Abstract

An authentication protocol is a type of computer communication protocol or cryptography protocol precisely constructed for transferring authentication data between two entities. The aim of this chapter is to propose two new entity authentication schemes that work in the center of the near-ring. The security of the proposed schemes is dependent on the intractability of the twisted near-ring root extraction problem over the near-ring.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call