Unshared Secret Key Cryptography: Finite constellation inputs and ideal secrecy outage.
Shuiyin LiuYi HongEmanuele ViterboPublished in: ICC (2015)
Keyphrases
- secret key
- key distribution
- key management
- session key
- mutual authentication
- smart card
- authentication scheme
- public key
- pseudorandom
- security analysis
- secure communication
- group communication
- stream cipher
- information security
- authentication protocol
- public key cryptography
- encryption scheme
- digital signature
- security level
- hash functions
- diffie hellman
- key management scheme
- ciphertext
- signature scheme
- rfid tags
- secret sharing scheme
- security protocols
- private key
- key agreement
- key establishment
- data sets
- provably secure
- low cost
- wireless sensor networks
- feature selection