On the leakage-resilient key exchange

Typically, secure channels are constructed from an authenticated key exchange (AKE) protocol, which authenticates the communicating parties based on long-term public keys and establishes secret session keys. In this paper we address the partial leakage of long-term secret keys of key exchange protoc...

Full description

Bibliographic Details
Main Author: Alawatugoda Janaka
Format: Article
Language:English
Published: De Gruyter 2017-12-01
Series:Journal of Mathematical Cryptology
Subjects:
Online Access:https://doi.org/10.1515/jmc-2016-0003

Similar Items