Cryptanalysis and Improvements on Some Graph-based Authentication Schemes

Mohammad Eftekhari, Herish Abdullah

In 2010, Grigoriev and Shpilrain, introduced some graph-based authentication schemes. We present a cryptanalysis of some of these protocols, and introduce some new schemes to fix the problems.

Knowledge Graph

arrow_drop_up

Comments

Sign up or login to leave a comment