Sound Approximations to Diffie-Hellman Using Rewrite Rules.
Christopher LynchCatherine A. MeadowsPublished in: ICICS (2004)
Keyphrases
- rewrite rules
- diffie hellman
- standard model
- public key
- elliptic curve
- encryption scheme
- group communication
- security properties
- secret key
- signature scheme
- transformation rules
- password based authenticated key exchange
- secure communication
- sql queries
- key management
- consistency constraints
- key distribution
- efficient computation
- complex queries
- query optimization
- security protocols
- data mining
- relational databases