Abstract
We present a new protocol for cryptographic key agreement between devices which have had no previous association, and which does not rely upon mutual access to a pre-existing key infrastructure. This protocol is suitable for use in mobile ad-hoc computing environments, where the only channels with high data origin authenticity have severely limited bandwidth. The protocol illustrates one use of an heretical design principle: allowing the “same” protocol to provide different security services in different contexts.
Original language | English |
---|---|
Pages (from-to) | 133-138 |
Journal | Lecture Notes in Computer Science (LNCS) |
Volume | 5964 |
DOIs | |
Publication status | Published - 2010 |