Session Key Distribution Using Smart Cards
Author
Shoup, V. Rubin A.
Entry type
article
Abstract
In this paper, we investigate a method by which smart cards can be used to enhance the security of session key distribution in the third-party setting of Needham & Schroeder. We extend the security model of Bellare & Rogaway to take into account both the strengths and weaknesses of smart card technology, we propose a session key distribution protocol, and we prove that it is secure assuming pseudo-random functions exist.
Date
1999 – 11 – 30
Key alpha
Shoup
Note
A copy is in the Papers cabinet in the commons.
Publication Date
2001-11-30
Contents
1. Intro
2. Session Key Distribution Without Smart Cards Revisited
3.Using Smart Cards
Language
English
Subject
Smart Cards

