Sufficient Condition for Identity-Based Authenticated Key Exchange Resilient to Leakage of Secret Keys.
Atsushi FujiokaKoutarou SuzukiPublished in: ICISC (2011)
Keyphrases
- sufficient conditions
- key exchange
- key distribution
- secret key
- diffie hellman
- key management
- encryption scheme
- signature scheme
- smart card
- secure communication
- authentication scheme
- key exchange protocol
- session key
- group communication
- public key
- digital signature
- ciphertext
- security analysis
- authentication protocol
- fault tolerant
- standard model
- key agreement protocol
- hash functions
- secret sharing scheme
- security protocols
- data points