TY - GEN
T1 - Session key distribution using smart cards
AU - Shoup, Victor
AU - Rubin, Avi
N1 - Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 1996.
PY - 1996
Y1 - 1996
N2 - In this paper, we investigate a method by which smart cards can be used to enhance the security of session key distribution in the third-party setting of Needham & Schroeder. We extend the security model of Bellare & Rogaway to take into account both the strengths and weaknesses of smart card technology, we propose a session key distribution protocol, and we prove that it is secure assuming pseudo-random functions exist.
AB - In this paper, we investigate a method by which smart cards can be used to enhance the security of session key distribution in the third-party setting of Needham & Schroeder. We extend the security model of Bellare & Rogaway to take into account both the strengths and weaknesses of smart card technology, we propose a session key distribution protocol, and we prove that it is secure assuming pseudo-random functions exist.
UR - http://www.scopus.com/inward/record.url?scp=84947904235&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84947904235&partnerID=8YFLogxK
U2 - 10.1007/3-540-68339-9_28
DO - 10.1007/3-540-68339-9_28
M3 - Conference contribution
AN - SCOPUS:84947904235
SN - 354061186X
SN - 9783540611868
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 321
EP - 331
BT - Advances in Cryptology - EUROCRYPT 1996 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings
A2 - Maurer, Ueli
PB - Springer Verlag
T2 - 15th International conference on Theory and Application of Cryptographic Techniques, EUROCRYPT 1996
Y2 - 12 May 1996 through 16 May 1996
ER -