Desired Features and Design Methodologies of Secure Authenticated Key Exchange Protocols in the Public-Key Infrastructure Setting

The importance of an authenticated key exchange (AKE) protocol has long been known in the field of cryptography. Two of the questions still being asked today are (1) what properties or features does a secure AKE protocol possess, and (2) How does one, in a step by step fashion, create a secure...

Full description

Bibliographic Details
Main Author: Wang, Hao-Hsien
Format: Others
Language:en
Published: University of Waterloo 2006
Subjects:
STS
Online Access:http://hdl.handle.net/10012/1087