Common use of Security Analysis Clause in Contracts

Security Analysis. In this section, we will analyze the security of our proposed scheme. The main assumption for guarantee of security lies in: 1) The elliptic-curve Diffie–▇▇▇▇▇▇▇ problem is hard; 2) The hash function h ( ) is the pseudorandom permutation for key derivation; Our scheme can achieve the goal of user authentication and key agreement with great assurance and certainly can prevent the well-known attacks, such as the replay, parallel session, reflection, interleaving, and man-in-the-middle attacks.

Appears in 2 contracts

Sources: Password Authenticated Key Agreement Scheme, Password Authenticated Key Agreement Scheme