Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Passive Impersonation Attack: after a pair of public and secret keys is generated, the adversary can choose to eavesdrop transcripts of executions of the identification scheme between P and V, until it decides to make an impersonation attempt; at this point, the adversary tries to make V accept without knowing the secret key.

(CalmetCrescenzo, 2008, p. 5)

Bibliography

See Also

Filter by label (Content by label)
showLabelsfalse
sorttitle
cqllabel = "passive-impersonation-attack"