Deniable Authenticated Key Establishment for Internet Protocols
Contribuinte(s) |
Christianson, B Crispo, B Malcolm, J Roe, M |
---|---|
Data(s) |
2005
|
Resumo |
We propose two public-key schemes to achieve “deniable authentication” for the Internet Key Exchange (IKE). Our protocols can be implemented using different concrete mechanisms and we discuss different options; in particular we suggest solutions based on elliptic curve pairings. The protocol designs use the modular construction method of Canetti and Krawczyk which provides the basis for a proof of security. Our schemes can, in some situations, be more efficient than existing IKE protocols as well as having stronger deniability properties. |
Formato |
application/pdf |
Identificador | |
Publicador |
Springer-Verlag |
Relação |
http://eprints.qut.edu.au/25481/1/25481_boyd_2006001782.pdf DOI:10.1007/11542322_31 Boyd, Colin, Mao, Wenbo, & Paterson, Kenneth (2005) Deniable Authenticated Key Establishment for Internet Protocols. Lecture Notes in Computer Science: Security Protocols, 3364, pp. 255-271. |
Fonte |
Faculty of Science and Technology; Information Security Institute |
Palavras-Chave | #080499 Data Format not elsewhere classified #089999 Information and Computing Sciences not elsewhere classified #Key Establishment, Deniability, Information Security |
Tipo |
Journal Article |