Common use of Security Analysis Clause in Contracts

Security Analysis. In this chapter, we go trough the security features that our base protocol in [11] pro- vides. Then we provide proofs that B-GKAP also assures the same security level for back- ▇▇▇▇ confidentiality and forward secrecy features of dynamic group operations as in the base protocol. Finally, we discuss security models of B-GKAP1 and B-GKAP2.

Appears in 2 contracts

Sources: Thesis Submission Agreement, Master's Thesis