2004
DOI: 10.1007/978-3-540-24631-2_2
|View full text |Cite
|
Sign up to set email alerts
|

The Key Establishment Problem

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2006
2006
2021
2021

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 104 publications
0
4
0
Order By: Relevance
“…A good survey of some of the topics considered in this paper is [72]. More generally, [10] provides an excellent survey on key establishment that goes beyond areas of combinatorial interest and [18] is probably the definitive work on cryptographic protocols relating to key establishment. Finally we note that both [7] and [26] include good reviews of other combinatorial applications to problems arising in information security.…”
Section: Cryptographic Key Managementmentioning
confidence: 99%
See 1 more Smart Citation
“…A good survey of some of the topics considered in this paper is [72]. More generally, [10] provides an excellent survey on key establishment that goes beyond areas of combinatorial interest and [18] is probably the definitive work on cryptographic protocols relating to key establishment. Finally we note that both [7] and [26] include good reviews of other combinatorial applications to problems arising in information security.…”
Section: Cryptographic Key Managementmentioning
confidence: 99%
“…Note that the precise meaning of property (2) in Definition 5.1 depends on the security model within which we are operating. If a KPS is unconditionally secure then these conditions can be stated information theoretically (see, for example [10]). The literature contains a wide variety of key predistribution schemes.…”
Section: Key Predistribution Schemesmentioning
confidence: 99%
“…More precisely, the user gets from S 1 the value 4 + 3 × 3 = 6 and the value 6 + 6 × 3 = 3 from S 2 . Using the public identifiers of S 1 and S 2 , the user sets up the two pairs of values (3,6), (2,3), and by applying the Lagrange Formula, he interpolates the polynomial P (x) = 3 × x − 3 mod 7. It is easy to see that P (0) = 4, and hence the user recovers κ 3 .…”
Section: Key Request and Key Computation Phasesmentioning
confidence: 99%
“…Several kinds of Key Distribution Schemes have been considered in the literature: Key Pre-Distribution Schemes (KPS, for short), Key Agreement Schemes (KAS, for short) and Broadcast Encryption Schemes (BES, for short) among others. The reader can consult [20] for a survey on unconditionally secure schemes, [19,11] for a general and detailed description of a variety of protocols for the Key Establishment Problem and related issues, and [3] for a simple introduction.…”
Section: Introductionmentioning
confidence: 99%