Concrete Security for Entity Recognition: The Jane Doe Protocol (Full Paper).
Stefan LucksErik ZennerAndré WeimerskirchDirk WesthoffPublished in: IACR Cryptol. ePrint Arch. (2009)
Keyphrases
- cryptographic protocols
- security protocols
- authentication protocol
- key agreement protocol
- security model
- ban logic
- key exchange protocol
- security properties
- security analysis
- communication protocols
- formal analysis
- security requirements
- provably secure
- key distribution
- denial of service attacks
- electronic voting
- information security
- network layer
- rfid systems
- mutual authentication
- cryptographic algorithms
- access control
- blind signature
- mobile payment
- security problems
- key agreement
- blind signature scheme
- diffie hellman
- key management
- secure multiparty computation
- protocol specification
- messages exchanged
- statistical databases
- security services
- physical layer
- security issues
- lightweight
- secure routing
- ns simulator
- security mechanisms
- homomorphic encryption
- key establishment
- privacy preserving
- smart card
- secure communication
- multi party
- intrusion detection
- security threats
- private key
- medium access control
- network security
- communication protocol
- public key