Security proof with dishonest keys.
Hubert Comon-LundhVéronique CortierGuillaume ScerriPublished in: IACR Cryptol. ePrint Arch. (2012)
Keyphrases
- security issues
- information security
- access control
- security requirements
- intrusion detection
- network security
- private key
- security problems
- theorem prover
- theorem proving
- security policies
- computer security
- information assurance
- security threats
- linear logic
- database
- key establishment
- key agreement
- security management
- data integrity
- secret key
- statistical databases