Deriving Ephemeral Authentication Using Channel Axioms
This is joint work with Dusko Pavlovic and it is our take on what we can contribute to brief encounters. So what’s involved in having some sort of authenticated brief encounter? You’re taking part in some sort of transaction or whatever that’s based upon properties that are fleeting, and so these may be things such as proximity, you want to exchange key material with somebody who’s near you, or do something else based on the fact that that principal is near you: direct human to human communication, direct physical contact, all these things can be involved, and they’re either things that you’re trying to verify, or that you’re actually using as evidence to create your picture.
KeywordsSecurity Protocol Proof Obligation Cryptographic Protocol Cryptographic Algorithm Direct Physical Contact
Unable to display preview. Download preview PDF.