Key Sharing Protocol Using Exchange by Integers over Public Noiseless Channels Between Users that Provides Security without Cryptographic Assumptions.
Viktor YakovlevValery I. KorzhikMilena AkhmetshinaAleksey ZhuvikinPublished in: FRUCT (2022)
Keyphrases
- security protocols
- cryptographic protocols
- secure communication
- share information
- security properties
- authentication protocol
- smart card
- trusted third party
- key management
- cryptographic algorithms
- multiple users
- high security
- homomorphic encryption
- security analysis
- digital signature
- security requirements
- data sharing
- security services
- user privacy
- encryption key
- packet filtering
- security mechanisms
- noisy data
- network security
- end users
- public space
- key distribution
- diffie hellman
- information sharing
- elliptic curve cryptography
- information security
- key agreement protocol
- encryption scheme
- access control
- fuzzy vault
- intrusion detection
- key exchange protocol
- random number generator
- security model
- information exchange
- security issues
- exchange information
- provably secure
- hash functions
- rfid systems