Session key distribution using smart cards

Victor Shoup, Avi Rubin

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we investigate a method by which smart cards can be used to enhance the security of session key distribution in the third-party setting of Needham & Schroeder. We extend the security model of Bellare & Rogaway to take into account both the strengths and weaknesses of smart card technology, we propose a session key distribution protocol, and we prove that it is secure assuming pseudo-random functions exist.

Original languageEnglish (US)
Title of host publicationAdvances in Cryptology - EUROCRYPT 1996 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings
EditorsUeli Maurer
PublisherSpringer Verlag
Pages321-331
Number of pages11
ISBN (Print)354061186X, 9783540611868
DOIs
StatePublished - 1996
Event15th International conference on Theory and Application of Cryptographic Techniques, EUROCRYPT 1996 - Saragossa, Spain
Duration: May 12 1996May 16 1996

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1070
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other15th International conference on Theory and Application of Cryptographic Techniques, EUROCRYPT 1996
CountrySpain
CitySaragossa
Period5/12/965/16/96

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Session key distribution using smart cards'. Together they form a unique fingerprint.

Cite this