Sciweavers

CCS
1993
ACM

On Simple and Secure Key Distribution

14 years 4 months ago
On Simple and Secure Key Distribution
Many recent research e orts in computer security focus on constructing provably secure authentication protocols. Although many of the resulting protocols rely on the a priori secure distribution of secret keys, no provably secure key distribution protocols have yet been demonstrated. In this paper, we use an existing secure two-party authentication protocol as a stepping stone for constructing a series of simple and secure key distribution protocols. The protocols are shown to satisfy desired security requirements, using the security properties of the underlying authentication protocol.
Gene Tsudik, Els Van Herreweghen
Added 09 Aug 2010
Updated 09 Aug 2010
Type Conference
Year 1993
Where CCS
Authors Gene Tsudik, Els Van Herreweghen
Comments (0)