Common use of Security in CK model Clause in Contracts

Security in CK model. The scheme is not resistant in the CK security model if the private keys dA and dB of the SM and SP respectively are leaked. This follows from the fact that CA = CB = dB AA and DA = DB = xXXX. As a result, the adversary is able to compute SK = H(XXX IDB CA DA) and the security of the session key is broken.

Appears in 3 contracts

Samples: pdfs.semanticscholar.org, res.mdpi.com, cronfa.swan.ac.uk

AutoNDA by SimpleDocs

Security in CK model. The scheme is not resistant in the CK security model if the private keys dA and dB of the SM and SP respectively are leaked. This follows from the fact that CA = CB = dB AA and DA = DB = xXXX. As a result, the adversary is able to compute SK = H(XXX IDB CA DAH(IDAǁIDBǁCAǁDA) and the security of the session key is broken.

Appears in 3 contracts

Samples: pdfs.semanticscholar.org, res.mdpi.com, research-repository.griffith.edu.au

AutoNDA by SimpleDocs
Time is Money Join Law Insider Premium to draft better contracts faster.