On Secrecy Amplification Protocols

Investor logo

Warning

This publication doesn't include Faculty of Economics and Administration. It includes Faculty of Informatics. Official publication website can be found on muni.cz.
Authors

OŠŤÁDAL Radim ŠVENDA Petr MATYÁŠ Václav

Year of publication 2015
Type Article in Proceedings
Conference Proceedings - Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015
MU Faculty or unit

Faculty of Informatics

Citation
Web http://crcs.cz/papers/wistp2015
Doi http://dx.doi.org/10.1007/978-3-319-24018-3_1
Field Informatics
Keywords secrecy amplification; key establishment; partial compromise
Description We review the most important secrecy amplification protocols, which are especially suitable for ad-hoc networks of devices with limited resources, providing additional resistance against various attacks on used cryptographic keys without necessity for asymmetric cryptography. We discuss and evaluate different designs as well as approaches to create new protocols. A special focus is given to suitability of these protocols with respect to different underlying key distribution schemes and also to open research questions.
Related projects:

You are running an old browser version. We recommend updating your browser to its latest version.