Abstract
An authentication protocol is a type of computer communication protocol or cryptography protocol precisely constructed for transferring authentication data between two entities. The aim of this chapter is to propose two new entity authentication schemes that work in the center of the near-ring. The security of the proposed schemes is dependent on the intractability of the twisted near-ring root extraction problem over the near-ring.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have