Provably secure mobile key exchange: Applying the Canetti-Krawczyk approach

17Citations
Citations of this article
23Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Practical use of the Canetti and Krawczyk approach to development of proven secure key exchange protocols is explored. The suite of protocols that can be developed using existing building blocks is discussed. An additional building block is provided by proving a new protocol secure in the ideal model of the approach. In the application area of wireless protocols it is shown that the best existing protocols can be matched with versions carrying security proofs. We conclude that building a library of building blocks will allow protocols with proven security to become the norm rather than the exception. © 2003 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Tin, Y. S. T., Boyd, C., & Nieto, J. M. G. (2003). Provably secure mobile key exchange: Applying the Canetti-Krawczyk approach. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2727 LNCS, pp. 166–179). https://doi.org/10.1007/3-540-45067-X_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free