An Information-Theoretic Approach for Secure Protocol Composition.
Yi-Ting ChiangTsan-sheng HsuChurn-Jung LiauYun-Ching LiuChih-Hao ShenDa-Wei WangJustin ZhanPublished in: SecureComm (1) (2014)
Keyphrases
- cryptographic protocols
- covert channel
- authentication protocol
- security protocols
- secure routing
- group communication
- key distribution
- scalar product
- lightweight
- key exchange protocol
- homomorphic encryption
- diffie hellman
- key agreement protocol
- secure multi party
- security analysis
- vertically partitioned data
- privacy preserving
- security properties
- key management
- secure multiparty computation
- security requirements
- multi party
- rfid systems
- key exchange
- password authentication
- mutual authentication
- cryptographic algorithms
- electronic voting
- security model
- key agreement
- key establishment
- mobile agent system
- blind signature
- provably secure
- web service composition
- trusted third party
- standard model
- security issues
- smart card
- digital signature scheme
- digital signature
- public key
- signature scheme