A Formal Security Analysis of the p=uiv p Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email.
Itzel Vázquez SandovalGabriele LenziniPublished in: ETAA@ESORICS (2019)
Keyphrases
- authentication protocol
- end to end
- security analysis
- key distribution
- encryption algorithm
- encryption scheme
- public key
- smart card
- security requirements
- group communication
- mutual authentication
- authentication scheme
- security properties
- multipath
- private key
- peer to peer
- wireless ad hoc networks
- ad hoc networks
- distributed systems
- secret key
- diffie hellman
- key exchange
- standard model
- ciphertext
- access control policies
- hash functions