Posets and protocols-picking the right three-party protocol.
Siaw-Lynn NgPublished in: IEEE J. Sel. Areas Commun. (2003)
Keyphrases
- cryptographic protocols
- network protocols
- security protocols
- communication protocol
- multi party non repudiation
- communication protocols
- authentication protocol
- voting protocols
- key agreement protocol
- key distribution
- fair exchange protocols
- concurrency control protocols
- contractual obligations
- protocol specification
- multi party
- transaction processing systems
- locking protocol
- medium access control
- trusted third party
- group communication
- message delivery
- message overhead
- secure multiparty computation
- messages exchanged
- fair exchange
- open archives initiative
- mutual authentication
- lightweight
- distributed databases
- key exchange
- formal analysis
- security analysis
- public key cryptosystems
- wireless medium
- security properties
- partially ordered sets
- privacy preserving
- correctness criteria
- smart card
- network simulator
- transport layer
- medium access
- ns simulator
- rfid systems
- private information retrieval
- commit protocols
- homomorphic encryption
- key establishment
- delay tolerant