On Secrecy Amplification Protocols
Authors | |
---|---|
Year of publication | 2015 |
Type | Article in Proceedings |
Conference | Proceedings - Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 |
MU Faculty or unit | |
Citation | |
Web | http://crcs.cz/papers/wistp2015 |
Doi | http://dx.doi.org/10.1007/978-3-319-24018-3_1 |
Field | Informatics |
Keywords | secrecy amplification; key establishment; partial compromise |
Description | We review the most important secrecy amplification protocols, which are especially suitable for ad-hoc networks of devices with limited resources, providing additional resistance against various attacks on used cryptographic keys without necessity for asymmetric cryptography. We discuss and evaluate different designs as well as approaches to create new protocols. A special focus is given to suitability of these protocols with respect to different underlying key distribution schemes and also to open research questions. |
Related projects: |