Authenticated Key Exchange, Signcryption and Deniable Signcryption Protocols Based on Two Hard Problems.
Do Viet BinhHieu Minh NguyenNguyen Nam HaiJunbeom HurDang Hoang MinhHo Sy TanPublished in: ACOMP (2017)
Keyphrases
- key exchange
- security properties
- hard problems
- security analysis
- authentication protocol
- key management
- key distribution
- diffie hellman
- security protocols
- digital signature
- key exchange protocol
- private key
- security requirements
- encryption scheme
- public key
- secure communication
- smart card
- formal model
- phase transition
- password based authenticated key exchange
- session key
- wireless sensor networks
- group communication
- cryptographic protocols
- ad hoc networks
- resource constrained
- standard model
- provably secure
- secret key
- lightweight
- low cost