Skip to main content

2003 | OriginalPaper | Buchkapitel

Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach

verfasst von : Yiu Shing Terry Tin, Colin Boyd, Juan Manuel González Nieto

Erschienen in: Information Security and Privacy

Verlag: Springer Berlin Heidelberg

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Practical use of the Canetti and Krawczyk approach to development of proven secure key exchange protocols is explored. The suite of protocols that can be developed using existing building blocks is discussed. An additional building block is provided by proving a new protocol secure in the ideal model of the approach. In the application area of wireless protocols it is shown that the best existing protocols can be matched with versions carrying security proofs. We conclude that building a library of building blocks will allow protocols with proven security to become the norm rather than the exception.

Metadaten
Titel
Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach
verfasst von
Yiu Shing Terry Tin
Colin Boyd
Juan Manuel González Nieto
Copyright-Jahr
2003
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/3-540-45067-X_15

Premium Partner