منابع مشابه
Key Exchange Using 'Keyless Cryptography'
In a classical cryptosystem, as opposed to a public-key cryptosystem, communication between users is based on a secret key known to them, but no others. A key-distribution protocol is employed to distribute copies of this secret key to the users. One simple way to perform key-distribution makes use of out-of-band communication a diplomatic courier, for example. More desirable for a computer net...
متن کاملCryptography. key exchange, public key
General cryptographic schemes are presented where keys can be one-time or ephemeral. Processes for key exchange are derived. Public key cryptographic schemes based on the new systems are established. Authentication and signature schemes are easy to implement. The schemes may be integrated with error-correcting coding schemes so that encryption/coding and decryption/decoding may be done simultan...
متن کاملKeyless Cryptography in Grid Computing Using Cyclic Shift Transposition Algorithm
Grid computing involves in the process of forming dynamic virtual organizations and associated resources in which the security is an important factor.Grid computing, is a distributed computing model in which new kind of systems are combined to form a heterogeneous computational resources such as computers, storage space, sensors, and experimental data. The grid can seamlessly, transparently and...
متن کاملA Practical Key Exchange for the Internet using Lattice Cryptography
In [21], Peikert presents an efficient and provably secure set of lower level primitives for practical post-quantum cryptography. These primitives also give the first lattice-based scheme to provide perfect forward secrecy, and thus represent a major advancement in providing the same sort of security guarantees that are now expected for modern internet traffic protection. However, the presentat...
متن کاملTwo-party authenticated key exchange protocol using lattice-based cryptography
Authenticated key exchange (AKE) protocol is an important cryptographic primitive that assists communicating entities, who are communicating over an insecure network, to establish a shared session key to be used for protecting their subsequent communication. Lattice-based cryptographic primitives are believed to provide resilience against attacks from quantum computers. An efficient AKE protoco...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Processing Letters
سال: 1983
ISSN: 0020-0190
DOI: 10.1016/0020-0190(83)90029-7