E ciency. Each application may have its own set of requirements on the e ciency of a key estab- lishment protocol. For example, secure mobile communications generally require a \light- weight" protocol, as a mobile device is usually computationally less powerful than a wired one. As a second example, a network layer security application has far more stringent requirements on the e ciency of key establishment than does an upper layer application. Optimally e cient protocols that rely on secret key cryptosystems and/or a KDC have been proposed in [8, 24]. Among public key based protocols, ▇▇▇▇▇▇ and ▇▇▇▇▇▇'▇ pro- posals [6] minimize the computational requirements of a less powerful participant. These protocols are particularly suitable for applications where one of the two participants is computationally weak.
Appears in 2 contracts
Sources: Submission to Ieee P1363a, Submission to Ieee P1363a