Provably secure KEM-based protocols over unauthenticated channels.
Rodrigo Martín Sánchez-LedesmaDavid Domingo MartínIván Blanco-ChacónIgnacio Luengo VelascoPublished in: CoRR (2023)
Keyphrases
- provably secure
- key management
- standard model
- key distribution
- public key
- security model
- blind signature scheme
- signature scheme
- blind signature
- security protocols
- diffie hellman
- hash functions
- authentication protocol
- cryptographic protocols
- public key cryptography
- multi channel
- partially blind signature scheme
- bilinear pairings
- wireless sensor networks
- security services
- group communication
- security properties
- security analysis
- resource constrained
- threshold signature scheme
- access control