Channel Traffic Minimizing Key Sharing Protocol Intended for the Use over the Internet and Secure without any Cryptographic Assumptions.
Viktor YakovlevValery I. KorzhikVladimir StarostinAlexey LapshinAleksey ZhuvikinPublished in: FRUCT (2022)
Keyphrases
- covert channel
- cryptographic protocols
- secure communication
- security protocols
- network traffic
- smart card
- internet traffic
- authentication protocol
- homomorphic encryption
- security mechanisms
- security properties
- cryptographic algorithms
- data sharing
- ip address
- encryption key
- key management
- key distribution
- security requirements
- lightweight
- diffie hellman
- digital signature
- multiple access
- private key
- file sharing
- tcp ip
- encryption scheme
- scalar product
- information sharing
- block cipher
- ip addresses
- computer networks
- security analysis
- secret key
- security issues
- standard model
- privacy preserving
- ad hoc networks
- key agreement protocol
- medium access control
- secure routing
- physical layer
- network layer
- multi party
- wireless networks