Unshared secret key cryptography: Achieving Shannon's ideal secrecy and perfect secrecy.
Shuiyin LiuYi HongEmanuele ViterboPublished in: ITW (2014)
Keyphrases
- secret key
- key distribution
- key management
- session key
- mutual authentication
- smart card
- secure communication
- pseudorandom
- authentication scheme
- security analysis
- public key
- group communication
- stream cipher
- security level
- private key
- diffie hellman
- provably secure
- secret sharing scheme
- authentication protocol
- encryption scheme
- signature scheme
- hash functions
- fault tolerant
- information security
- key establishment
- multi dimensional
- ciphertext
- security protocols
- block cipher
- uniformly distributed
- secret data
- rfid tags
- ad hoc networks
- key management scheme