Controllable Identifier Measurements for Private Authentication With Secret Keys
نویسندگان
چکیده
منابع مشابه
Public Keys and Private Keys
This work is about developing tools for secure communications using quantum protocols. The work focuses on ways to transfer classical information using quantum communication channels, and exploiting the properties of quantum information theory to achieve secrecy. Quantum cryptography and classical cryptography essentially deal with the same tasks, such as, just to mention a few, private communi...
متن کاملProtecting Secret Keys with Blind Computation Service
More and more secure symmetric key encryption algorithms with long keys are being developed and used. But, the threat is still near to us. All the attackers have to do is guessing the password of the user to make a brute force attack on the encrypted data, not the secret key. In this paper, we propose a blind computation service which can be used as a part of an encryption and decryption proced...
متن کاملSecret Key Watermarking with Changing Keys
In this paper we consider a digital watermarking application where multiple parties can embed additional information using their watermark embedder. These parties are not supposed to influence each other and each watermark detector needs to be able to decode the information embedded by any of the embedder systems. One approach would be to use a single secret key and to assign part of the payloa...
متن کاملPublic Key Cryptosystems with Noisy Secret Keys
Passwords bootstrap symmetric and asymmetric cryptography, tying keys to an individual user. Biometrics are intended to strengthen this tie. Unfortunately, biometrics exhibit noise between repeated readings. Fuzzy extractors (Dodis et al., Eurocrypt 2004) derive stable symmetric keys from noisy sources. We ask if it is also possible for noisy sources to directly replace private keys in asymmetr...
متن کاملProtecting secret keys with personal entropy
Conventional encryption technology often requires users to protect a secret key by selecting a password or passphrase. While a good passphrase will only be known to the user, it also has the flaw that it must be remembered exactly in order to recover the secret key. As time passes, the ability to remember the passphrase fades and the user may eventually lose access to the secret key. We propose...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2018
ISSN: 1556-6013,1556-6021
DOI: 10.1109/tifs.2018.2806937