Efficient & secure cipher scheme with dynamic key-dependent mode of operation

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient Key Generation for Dynamic Blom's Scheme

The need for secure communication between the nodes in a network has led to the development of various key distribution schemes. Blom’s scheme is a prominent key exchange protocol used for sensor and wireless networks, but its shortcomings include large computation overhead and memory cost. In this paper, we propose an efficient key management scheme by generating new public and private keys. W...

متن کامل

An efficient secure channel coding scheme based on polar codes

In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...

متن کامل

An efficient key management scheme for secure wireless multicast

In the future, many multicast services will take place in the wireless domain. However, before these services can successfully be deployed, security infrastructures must be developed that manage the keys needed to provide access control to content. In this paper, we present a method for designing multicast key management trees that are suitable for mobile wireless environments. By matching the ...

متن کامل

Efficient CCA-secure Threshold Public-Key Encryption Scheme

In threshold public-key encryption, the decryption key is divided into n shares, each one of which is given to a different decryption user in order to avoid single points of failure. In this study, we propose a simple and efficient non-interactive threshold publickey encryption scheme by using the hashed Diffie-Hellman assumption in bilinear groups. Compared with the other related constructions...

متن کامل

Provably-Secure and Communication-Efficient Scheme for Dynamic Group Key Exchange

Group key agreement protocols are designed to solve the fundamental problem of securely establishing a session key among a group of parties communicating over a public channel. Although a number of protocols have been proposed to solve this problem over the years, they are not well suited for a high-delay wide area network; their communication overhead is significant in terms of the number of c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Signal Processing: Image Communication

سال: 2019

ISSN: 0923-5965

DOI: 10.1016/j.image.2019.08.005