Key Exchange with Anonymous Authentication Using DAA-SIGMA Protocol.
Jesse WalkerJiangtao LiPublished in: INTRUST (2010)
Keyphrases
- key exchange
- security analysis
- key distribution
- session key
- authentication protocol
- diffie hellman
- key exchange protocol
- public key
- secure communication
- smart card
- key management
- private key
- group communication
- security requirements
- peer to peer
- security protocols
- elliptic curve
- digital signature
- security properties
- fault tolerant
- secret key
- standard model
- security mechanisms
- encryption scheme
- trusted computing