A New Sampling Protocol and Applications to Basing Cryptographic Primitives on the Hardness of NP.
Iftach HaitnerMohammad MahmoodyDavid XiaoPublished in: Electron. Colloquium Comput. Complex. (2010)
Keyphrases
- cryptographic protocols
- security protocols
- computational complexity
- np complete
- np hard
- packet filtering
- smart card
- security properties
- cryptographic algorithms
- authentication protocol
- low level
- lightweight
- high level
- tcp ip
- sample size
- np hardness
- key management
- security analysis
- hash functions
- network protocols
- monte carlo
- homomorphic encryption
- building blocks
- sampling methods
- worst case
- formal analysis
- communication protocol
- key distribution
- phase transition
- security mechanisms
- sampling strategy
- security requirements
- model checking