Security Bounds for Parallel Versions of Identification Protocols (Extended Abstract).
Lidong ChenIvan DamgårdPublished in: EUROCRYPT (1992)
Keyphrases
- extended abstract
- security protocols
- cryptographic protocols
- key agreement protocol
- security services
- security properties
- communication protocols
- authentication protocol
- upper bound
- information security
- statistical databases
- lower bound
- access control
- parallel processing
- parallel implementation
- key exchange
- key establishment
- application level
- secure multiparty computation
- security mechanisms
- security issues
- communication protocol
- key distribution
- upper and lower bounds
- privacy preserving
- network management
- intrusion detection
- sensitive data
- security level
- error bounds
- smart card
- trusted third party
- worst case