Desired Features and Design Methodologies of Secure Authenticated Key Exchange Protocols in the Public-Key Infrastructure Setting
The importance of an authenticated key exchange (AKE) protocol has long been known in the field of cryptography. Two of the questions still being asked today are (1) what properties or features does a secure AKE protocol possess, and (2) How does one, in a step by step fashion, create a secure...
Main Author: | |
---|---|
Format: | Others |
Language: | en |
Published: |
University of Waterloo
2006
|
Subjects: | |
Online Access: | http://hdl.handle.net/10012/1087 |