Deriving Ephemeral Authentication Using Channel Axioms

(Transcript of Discussion)
  • Catherine Meadows
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7028)


This is joint work with Dusko Pavlovic and it is our take on what we can contribute to brief encounters. So what’s involved in having some sort of authenticated brief encounter? You’re taking part in some sort of transaction or whatever that’s based upon properties that are fleeting, and so these may be things such as proximity, you want to exchange key material with somebody who’s near you, or do something else based on the fact that that principal is near you: direct human to human communication, direct physical contact, all these things can be involved, and they’re either things that you’re trying to verify, or that you’re actually using as evidence to create your picture.


Security Protocol Proof Obligation Cryptographic Protocol Cryptographic Algorithm Direct Physical Contact 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Catherine Meadows
    • 1
  1. 1.Naval Research LaboratoryUSA

Personalised recommendations