A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Comparing the Pre- and Post-specified Peer Models for Key Agreement
[chapter]
Lecture Notes in Computer Science
In the pre-specified peer model for key agreement, it is assumed that a party knows the identifier of its intended communicating peer when it commences a protocol run. On the other hand, a party in the post-specified peer model for key agreement does not know the identifier of its communicating peer at the outset, but learns the identifier during the protocol run. In this paper we compare the security assurances provided by the Canetti-Krawczyk security definitions for key agreement in the
doi:10.1007/978-3-540-70500-0_5
fatcat:4ulwccjgxzfjfivgvm7lglctl4