Separating two roles of hashing in one−way message authentication
We analyse two new and related families of authentication protocols, where a party wants to authenticate its public information to another. In the first, the objective is to do without shared passwords or a PKI, making use of low-bandwidth empirical or authentic channels where messages cannot be fak...
Format: | Conference item |
---|---|
Publicat: |
2008
|