Concrete Security for Entity Recognition: The Jane Doe Protocol.
Stefan LucksErik ZennerAndré WeimerskirchDirk WesthoffPublished in: INDOCRYPT (2008)
Keyphrases
- cryptographic protocols
- security protocols
- authentication protocol
- key agreement protocol
- security properties
- security analysis
- security model
- communication protocols
- key exchange protocol
- denial of service attacks
- security requirements
- mutual authentication
- rfid systems
- mobile payment
- cryptographic algorithms
- secure routing
- security services
- access control
- secure multiparty computation
- key distribution
- elliptic curve
- security issues
- key exchange
- provably secure
- information security
- homomorphic encryption
- security problems
- key management
- security mechanisms
- network security
- statistical databases
- intrusion detection
- smart card
- contractual obligations
- wireless sensor networks
- protocol specification
- medium access control
- ad hoc networks
- communication protocol