Improving security of the ping-pong protocol.
Piotr ZawadzkiPublished in: Quantum Inf. Process. (2013)
Keyphrases
- ping pong
- cryptographic protocols
- security protocols
- authentication protocol
- key exchange protocol
- security properties
- security model
- security analysis
- key agreement protocol
- formal analysis
- mobile payment
- ban logic
- denial of service attacks
- rfid systems
- mutual authentication
- cryptographic algorithms
- communication protocols
- secure multiparty computation
- access control
- electronic voting
- protocol specification
- key distribution
- blind signature
- secure routing
- lightweight
- intrusion detection
- messages exchanged
- key agreement
- information security
- medium access control
- security requirements
- provably secure
- diffie hellman
- security services
- key management
- public key
- group communication
- statistical databases
- elliptic curve
- mobile agent system
- privacy preserving
- wireless sensor networks
- virtual private network
- physical layer
- secure communication
- network security
- tcp ip
- trusted third party