Reusing Tamper-Proof Hardware in UC-Secure Protocols.
Jeremias MechlerJörn Müller-QuadeTobias NilgesPublished in: Public Key Cryptography (1) (2018)
Keyphrases
- security properties
- cryptographic protocols
- security protocols
- application level
- key exchange
- key distribution
- low cost
- security requirements
- authentication protocol
- security level
- key agreement protocol
- hardware and software
- security analysis
- diffie hellman
- security services
- multi party
- real time
- key establishment
- key management
- embedded systems
- group communication
- theorem proving
- hardware implementation
- security mechanisms
- formal model
- computer systems
- trusted computing
- single chip
- theorem prover
- homomorphic encryption
- secure multiparty computation
- public key cryptosystems
- communication protocol
- standard model
- security issues
- authentication scheme
- lightweight
- user authentication
- secure communication
- smart card
- digital signature
- advanced encryption standard
- digital watermarking
- computing platform
- forward secure
- secret key
- wireless medium