Authenticated key exchange protocol under computational Diffie-Hellman assumption from trapdoor test technique

2015 
This paper investigates authenticated key exchange AKE protocol under computational Diffie-Hellman assumption in the extended Canetti-Krawczyk model. The core technical component of our protocol is...
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    0
    Citations
    NaN
    KQI
    []