Login / Signup
All graph state verification protocols are composably secure.
Léo Colisson
Damian Markham
Raja Yehia
Published in:
CoRR (2024)
Keyphrases
</>
cryptographic protocols
security protocols
application level
model checking
multi party
high security
key exchange
random walk
graph theory
graph structure
graph representation
security issues
formal analysis
formal verification
key distribution
user authentication