Equational Security of a Lattice-based Oblivious Transfer Protocol.
Momeng LiuYu-Pu HuPublished in: J. Netw. Intell. (2017)
Keyphrases
- security protocols
- cryptographic protocols
- authentication protocol
- security properties
- key agreement protocol
- security model
- security analysis
- key exchange protocol
- rfid systems
- key distribution
- mutual authentication
- mobile payment
- provably secure
- denial of service attacks
- private information retrieval
- theorem proving
- security requirements
- communication protocols
- information security
- lightweight
- secure routing
- access control
- ban logic
- virtual private network
- physical layer
- secure multiparty computation
- key agreement
- elliptic curve
- network security
- electronic voting
- security problems
- key management
- protocol specification
- security issues
- intrusion detection
- statistical databases
- formal analysis
- key establishment
- cryptographic algorithms
- messages exchanged
- equational theories
- smart card
- transfer learning
- sensor networks
- theorem prover
- trust negotiation
- blind signature
- public key
- key exchange
- standard model
- group communication
- network layer
- security threats