Controllable Identifier Measurements for Private Authentication With Secret Keys

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Public Keys and Private Keys

This work is about developing tools for secure communications using quantum protocols. The work focuses on ways to transfer classical information using quantum communication channels, and exploiting the properties of quantum information theory to achieve secrecy. Quantum cryptography and classical cryptography essentially deal with the same tasks, such as, just to mention a few, private communi...

متن کامل

Protecting Secret Keys with Blind Computation Service

More and more secure symmetric key encryption algorithms with long keys are being developed and used. But, the threat is still near to us. All the attackers have to do is guessing the password of the user to make a brute force attack on the encrypted data, not the secret key. In this paper, we propose a blind computation service which can be used as a part of an encryption and decryption proced...

متن کامل

Secret Key Watermarking with Changing Keys

In this paper we consider a digital watermarking application where multiple parties can embed additional information using their watermark embedder. These parties are not supposed to influence each other and each watermark detector needs to be able to decode the information embedded by any of the embedder systems. One approach would be to use a single secret key and to assign part of the payloa...

متن کامل

Public Key Cryptosystems with Noisy Secret Keys

Passwords bootstrap symmetric and asymmetric cryptography, tying keys to an individual user. Biometrics are intended to strengthen this tie. Unfortunately, biometrics exhibit noise between repeated readings. Fuzzy extractors (Dodis et al., Eurocrypt 2004) derive stable symmetric keys from noisy sources. We ask if it is also possible for noisy sources to directly replace private keys in asymmetr...

متن کامل

Protecting secret keys with personal entropy

Conventional encryption technology often requires users to protect a secret key by selecting a password or passphrase. While a good passphrase will only be known to the user, it also has the flaw that it must be remembered exactly in order to recover the secret key. As time passes, the ability to remember the passphrase fades and the user may eventually lose access to the secret key. We propose...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Forensics and Security

سال: 2018

ISSN: 1556-6013,1556-6021

DOI: 10.1109/tifs.2018.2806937