On the Provable Security of the Dragonfly Protocol.
Jean LancrenonMarjan SkrobotPublished in: ISC (2015)
Keyphrases
- cryptographic protocols
- security protocols
- authentication protocol
- key agreement protocol
- key exchange protocol
- ban logic
- security model
- security analysis
- mutual authentication
- communication protocols
- rfid systems
- formal analysis
- security properties
- denial of service attacks
- mobile payment
- information security
- messages exchanged
- key distribution
- lightweight
- cryptographic algorithms
- access control
- security requirements
- protocol specification
- network security
- elliptic curve
- physical layer
- security services
- mobile agent system
- contractual obligations
- distributed systems
- key agreement
- electronic voting
- network layer
- secure routing
- virtual private network
- semi honest
- key establishment
- security issues
- trusted third party
- key management
- medium access control
- rfid tags
- statistical databases
- trust negotiation
- blind signature
- blind signature scheme
- homomorphic encryption
- encryption scheme
- secure multiparty computation
- provably secure
- key exchange
- diffie hellman