On Secrecy Amplification Protocols

Abstract : We review most important secrecy amplification protocols that are suitable for ad-hoc networks of devices with limited resources, providing additional resistance against various attacks on used cryptographic keys without necessity for asymmetric cryptography. We discuss and evaluate different designs as well as approaches to create new protocols. A special focus is given to suitability of these protocols with respect to different underlying key distribution schemes and also to open issues.
Type de document :
Communication dans un congrès
Raja Naeem Akram; Sushil Jajodia. 9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. Springer, Lecture Notes in Computer Science, LNCS-9311, pp.3-19, 2015, Information Security Theory and Practice. 〈10.1007/978-3-319-24018-3_1〉
Liste complète des métadonnées

https://hal.inria.fr/hal-01442550
Contributeur : Hal Ifip <>
Soumis le : vendredi 20 janvier 2017 - 16:47:57
Dernière modification le : vendredi 20 janvier 2017 - 16:52:45
Document(s) archivé(s) le : vendredi 21 avril 2017 - 16:15:47

Fichier

978-3-319-24018-3_1_Chapter.pd...
Fichiers produits par l'(les) auteur(s)

Licence


Distributed under a Creative Commons Paternité 4.0 International License

Identifiants

Citation

Radim Ošťádal, Petr Švenda, Vashek Matyáš. On Secrecy Amplification Protocols. Raja Naeem Akram; Sushil Jajodia. 9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. Springer, Lecture Notes in Computer Science, LNCS-9311, pp.3-19, 2015, Information Security Theory and Practice. 〈10.1007/978-3-319-24018-3_1〉. 〈hal-01442550〉

Partager

Métriques

Consultations de la notice

37