Key Establishment Protocol for Computation-limited Devices

Abstract

This paper present a new protocol based on symmetric encryption, which has quasi-forward secrecy and resistance to quasi-key compromise impersonation. It is a protocol suitable for computation-limited devices. Also by blinding the long-term key, we make the attack to long-term key harder.We have done the theoretical analysis and will finish the simulation and implementation.

Extracted Key Phrases

Cite this paper

@inproceedings{Liu2006KeyEP, title={Key Establishment Protocol for Computation-limited Devices}, author={Zhan Liu and Mi Lu}, booktitle={PDPTA}, year={2006} }