A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers
2016
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
Security of a key exchange protocol is formally established through an abstract game between a challenger and an adversary. In this game the adversary can get various information which are modeled by giving the adversary access to appropriate oracle queries. Empowered with all these information, the adversary will try to break the protocol. This is modeled by a test query which asks the adversary to distinguish between a session key of a fresh session from a random session key; properly
doi:10.22667/jowua.2016.03.31.001
dblp:journals/jowua/ChakrabortyRR16
fatcat:pe2gbf24qna6veuebc2arc4iva