Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement.
Stefan WolfPublished in: ASIACRYPT (1998)
Keyphrases
- information theoretic
- key agreement
- secret key
- security properties
- security protocols
- information theory
- key agreement protocol
- mutual information
- smart card
- elliptic curve
- diffie hellman
- authentication scheme
- security mechanisms
- security requirements
- information theoretic measures
- key management
- public key
- cryptographic protocols
- key distribution
- information bottleneck
- security problems
- information security
- secure communication
- mutual authentication
- hash functions
- security services
- private key
- authentication protocol
- watermarking scheme
- cyber attacks
- ciphertext