Scaling security in pairing-based protocols.
Michael ScottPublished in: IACR Cryptol. ePrint Arch. (2005)
Keyphrases
- security protocols
- key agreement protocol
- cryptographic protocols
- security properties
- security services
- information security
- communication protocols
- security issues
- authentication protocol
- key distribution
- security mechanisms
- access control
- security requirements
- security policies
- key exchange
- secure multiparty computation
- key establishment
- security systems
- application level
- security analysis
- key management
- intrusion detection
- security problems
- messages exchanged
- communication protocol
- security threats
- computer security
- trusted third party
- statistical databases
- sensor networks