Exponential secrecy against unbounded adversary using joint encryption and privacy amplification.
Yahya Sowti KhiabaniShuangqing WeiPublished in: CNS (2013)
Keyphrases
- security properties
- mutual authentication
- security analysis
- privacy protection
- key management
- security requirements
- formal model
- authentication protocol
- rfid tags
- authentication scheme
- security protocols
- secret key
- cryptographic protocols
- privacy preserving
- diffie hellman
- data confidentiality
- personal information
- smart card
- trusted third party
- key exchange
- data security
- security services
- encryption algorithm
- rfid systems
- wireless sensor networks
- supply chain
- spread spectrum
- digital signature
- social networks
- differential privacy
- privacy preservation
- security policies