A secret key distribution technique based on semiconductor superlattice chaos devices

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving secret key generation performance for on-body devices

In this paper, we undertake experiments to assess the feasibility of generating common secret keys between two bodyworn devices using the near-body channel. Deriving secret keys using the wireless channel is a practical and lightweight alternative to public-key key-agreement approaches. Our results indicate that key generation is good for dynamic scenarios where communicating devices are placed...

متن کامل

Mobile Secret Key Distribution with Network Coding

We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main contribution is a practical scheme that relies on network coding to provide a robust and low-complexity solution for sharing secret keys among sensor nodes. In spite of its role as a key enabler for this approach, the...

متن کامل

Network Coding Protocols for Secret Key Distribution

Recent contributions have uncovered the potential of network coding, i.e. algebraic mixing of multiple information flows in a network, to provide enhanced security in packet oriented wireless networks. We focus on exploiting network coding for secret key distribution in a sensor network with a mobile node. Our main contribution is a set of extensions for a simple XOR based scheme, which is show...

متن کامل

Ultra Secured and Authentic Key Distribution Protocol using a Novel Secret Sharing Technique

Protection of sensitive data is an important issue, precisely during transmission over internet. Efficient cryptographic methods are there to protect data but everything depends on the protection of the encryption key. Threshold cryptography enables the construction of reliable and robust key management system which can reconstruct the key even in the destroy of some shares and on the contrary ...

متن کامل

Quantum Flows for Secret Key Distribution

In practice, the security of a Quantum Key Distribution (QKD) system relies not only on quantum mechanical principles, but it also significantly relies on the physical implementation of the protocol. Nowadays, technological detector loopholes of QKD systems have been demonstrated, and some successful attacks that exploit vulnerabilities of the Avalanche Photo Diodes (APD’s) have been performed....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Science Bulletin

سال: 2018

ISSN: 2095-9273

DOI: 10.1016/j.scib.2018.06.017