Revisiting the security of secure direct communication based on ping-pong protocol[Quantum Inf. Process. 8, 347 (2009)].
Yu-Guang YangYi-Wei TengHai-Ping ChaiQiao-Yan WenPublished in: Quantum Inf. Process. (2011)
Keyphrases
- cryptographic protocols
- communication protocols
- security analysis
- authentication protocol
- security protocols
- group communication
- ping pong
- security properties
- key agreement protocol
- lightweight
- security mechanisms
- key exchange protocol
- diffie hellman
- secure communication
- security model
- security level
- mutual authentication
- key distribution
- covert channel
- rfid systems
- key exchange
- communication protocol
- access control
- electronic voting
- session key
- medium access control
- security issues
- rfid tags
- multi party
- provably secure
- key management
- security services
- security requirements
- information sharing
- authentication mechanism
- information security
- computer networks