Abstract | ||
---|---|---|
A new formal security model for session key exchange protocols in the public key setting isproposed, and several efficient protocols are analyzed in this model. The relationship betweenthis new model and previously proposed models is explored, and several interesting, subtledistinctions between static and adaptive adversaries are explored. We also give a brief accountof anonymous users.1 IntroductionIn this paper, we investigate formal models of security for authenticated key exchange... |
Year | Venue | Keywords |
---|---|---|
1999 | IACR Cryptology ePrint Archive | public key,security model,key exchange |
Field | DocType | Volume |
Key distribution,Key exchange,Computer science,Computer security,MQV,Security association | Journal | 1999 |
Citations | PageRank | References |
214 | 20.68 | 5 |
Authors | ||
1 |
Name | Order | Citations | PageRank |
---|---|---|---|
Victor Shoup | 1 | 214 | 21.36 |