%0 Conference Proceedings %T On Secrecy Amplification Protocols %+ Masaryk University [Brno] (MUNI) %A Ošťádal, Radim %A Švenda, Petr %A Matyáš, Vashek %Z Part 1: Security and Privacy Services %< avec comité de lecture %( Lecture Notes in Computer Science %B 9th Workshop on Information Security Theory and Practice (WISTP) %C Heraklion, Crete, Greece %Y Raja Naeem Akram %Y Sushil Jajodia %I Springer %3 Information Security Theory and Practice %V LNCS-9311 %P 3-19 %8 2015-08-24 %D 2015 %R 10.1007/978-3-319-24018-3_1 %Z Computer Science [cs]Conference papers %X We review most important secrecy amplification protocols that are suitable for ad-hoc networks of devices with limited resources, providing additional resistance against various attacks on used cryptographic keys without necessity for asymmetric cryptography. We discuss and evaluate different designs as well as approaches to create new protocols. A special focus is given to suitability of these protocols with respect to different underlying key distribution schemes and also to open issues. %G English %Z TC 11 %Z WG 11.2 %2 https://inria.hal.science/hal-01442550/document %2 https://inria.hal.science/hal-01442550/file/978-3-319-24018-3_1_Chapter.pdf %L hal-01442550 %U https://inria.hal.science/hal-01442550 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-WISTP %~ IFIP-WG11-2 %~ IFIP-LNCS-9311