A cryptographically sound security proof of the Needham-Schroeder-Lowe public-key protocol.
Michael BackesBirgit PfitzmannPublished in: IEEE J. Sel. Areas Commun. (2004)
Keyphrases
- public key
- session key
- security model
- authentication protocol
- security analysis
- provably secure
- diffie hellman
- public key cryptosystem
- private key
- public key encryption scheme
- message authentication codes
- blind signature
- homomorphic encryption
- public key cryptography
- blind signature scheme
- signature scheme
- elliptic curve cryptography
- encryption scheme
- digital signature
- secure communication
- image authentication
- secret key
- security properties
- key exchange
- high security
- authentication scheme
- cryptographic protocols
- identity based encryption
- key distribution
- rfid tags
- cca secure
- user authentication
- public key infrastructure
- encryption algorithm
- ad hoc networks
- image encryption
- public key encryption
- ciphertext
- lightweight