Increasing the security of the ping-pong protocol by using mutually unbiased bases
Piotr ZawadzkiZbigniew PuchalaJaroslaw Adam MiszczakPublished in: CoRR (2012)
Keyphrases
- ping pong
- cryptographic protocols
- security protocols
- security properties
- key agreement protocol
- authentication protocol
- key exchange protocol
- communication protocols
- security analysis
- ban logic
- security model
- information security
- denial of service attacks
- formal analysis
- physical layer
- rfid systems
- security issues
- intrusion detection
- lightweight
- access control
- mutual authentication
- network security
- key distribution
- secure routing
- provably secure
- statistical databases
- cryptographic algorithms
- contractual obligations
- key agreement
- medium access control
- security requirements
- trusted third party
- elliptic curve
- security services
- electronic voting
- messages exchanged
- homomorphic encryption
- protocol specification
- smart card
- database systems