Anonymity in Network Connections for Mobile Communication
This thesis summarizes an existing protocol, that we have chosen to call the Token Key Agreement protocol. It then goes on to introduce two new protocols we have chosen to name the Symmetric Key Agreement protocol and the Asymmetric Key Agreement protocol. We are working within the UC framework, and as such introduce ideal functionalities and protocol descriptions for the protocols. For the first protocol we also introduce a simulated adversary. Further, the paper includes an overview of the security offered by the three protocols.
Place, publisher, year, edition, pages
Institutt for matematiske fag , 2012. , 89 p.
ntnudaim:7471, MTFYMA fysikk og matematikk, Industriell matematikk
IdentifiersURN: urn:nbn:no:ntnu:diva-18690Local ID: ntnudaim:7471OAI: oai:DiVA.org:ntnu-18690DiVA: diva2:566189
Gjøsteen, Kristian, Førsteamanuensis