Deniable Key Establishment Resistance against eKCI Attacks

In extended Key Compromise Impersonation (eKCI) attack against authenticated key establishment (AKE) protocols the adversary impersonates one party, having the long term key and the ephemeral key of the other peer party. Such an attack can be mounted against variety of AKE protocols, including 3-pas...

Full description

Bibliographic Details
Main Authors: Łukasz Krzywiecki, Tomasz Wlisłocki
Format: Article
Language:English
Published: Hindawi-Wiley 2017-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2017/7810352