Authenticated key exchange protocol under computational Diffie-Hellman assumption from trapdoor test technique
2015
This paper investigates authenticated key exchange AKE protocol under computational Diffie-Hellman assumption in the extended Canetti-Krawczyk model. The core technical component of our protocol is...
Keywords:
- Correction
- Source
- Cite
- Save
- Machine Reading By IdeaReader
0
References
0
Citations
NaN
KQI