Introduction Security models Extensions and alternative approaches Conclusion Security models for group key exchange A survey E. Bresson CELAr, Cryptology Department Horst Gortz Institute, May 4th, 2006 E. Bresson Security models for group key exchange Introduction Security models Extensions and alternative approaches Conclusion 1 Introduction 2 Security models 3 Extensions and alternative approaches 4 Conclusion E. Bresson Security models for group key exchange
- introduction security
- can eavesdrop
- active adversary
- ???? ????
- key sk
- low-entropy asymmetric
- secret
- exchange protocol
- key exchange