1989
DOI: 10.1109/49.17711
|View full text |Cite
|
Sign up to set email alerts
|

Key distribution system based on identification information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
49
0

Year Published

1998
1998
2015
2015

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 121 publications
(49 citation statements)
references
References 9 publications
0
49
0
Order By: Relevance
“…While the need for the former hash is quite clear (it is somewhat hinted to in [22] and included in the variant of the protocol in [37]), the need for the second hashing is more subtle. And in fact, the second hash does not appear in [32] and follow-up work (including [22] and other works that claimed the protocol's security); they defined the session key to be the value (β e /B) x mod N = (α e /A) x mod N without the hashing operation. As we see next, both hashing steps are essential for the security of the protocol and, in particular, for proving its security.…”
Section: Rationale For the Modifications Of The Original Mot Protocolmentioning
confidence: 99%
See 4 more Smart Citations
“…While the need for the former hash is quite clear (it is somewhat hinted to in [22] and included in the variant of the protocol in [37]), the need for the second hashing is more subtle. And in fact, the second hash does not appear in [32] and follow-up work (including [22] and other works that claimed the protocol's security); they defined the session key to be the value (β e /B) x mod N = (α e /A) x mod N without the hashing operation. As we see next, both hashing steps are essential for the security of the protocol and, in particular, for proving its security.…”
Section: Rationale For the Modifications Of The Original Mot Protocolmentioning
confidence: 99%
“…In this section we describe in full detail the modified version of the Okamoto-Tanaka protocol and provide rationale for the modifications made to the original protocol from [32]. Throughout the paper we refer to this protocol as the "Modified Okamoto-Tanaka Protocol (mOT)".…”
Section: The Modified Okamoto-tanaka Protocolmentioning
confidence: 99%
See 3 more Smart Citations