Distributed authentication for randomly compromised networks
نویسندگان
چکیده
منابع مشابه
Distributed authentication for randomly compromised networks
We introduce a simple, practical approach with probabilistic information-theoretic security to solve one of quantum key distribution’s major security weaknesses: the requirement of an authenticated classical channel to prevent man-in-the-middle attacks. Our scheme uses classical secret sharing techniques and partially trusted intermediaries and provides arbitrarily high confidence in the securi...
متن کاملDistributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Security services for adhoc networks cannot assume the existence of a particular infrastructure. Peer-to-peer technology is promising in addressing security issues in ad-hoc networks. We provide a novel; cryptographically se...
متن کاملDistributed H∞ filtering over randomly switching networks
The paper considers a distributed robust estimation problem over a network with randomly changing topology. The objective is to deal with these changes locally, by switching observer gains at affected nodes only. We propose sufficient conditions which guarantee a suboptimal H∞ level of disagreement of estimates in such observer networks, both in the mean-square sense and with probability 1. Whe...
متن کاملDistributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network
We introduce a simple, practical approach with probabilistic information-theoretic security to mitigate one of quantum key distribution’s major limitations: the short maximum transmission distance (∼ 200 km) possible with present day technology. Our scheme uses classical secret sharing techniques to allow secure transmission over long distances through a network containing randomly-distributed ...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: New Journal of Physics
سال: 2009
ISSN: 1367-2630
DOI: 10.1088/1367-2630/11/8/085005