Key exchange using ‘keyless cryptography’

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Key Exchange Using 'Keyless Cryptography'

In a classical cryptosystem, as opposed to a public-key cryptosystem, communication between users is based on a secret key known to them, but no others. A key-distribution protocol is employed to distribute copies of this secret key to the users. One simple way to perform key-distribution makes use of out-of-band communication a diplomatic courier, for example. More desirable for a computer net...

متن کامل

Cryptography. key exchange, public key

General cryptographic schemes are presented where keys can be one-time or ephemeral. Processes for key exchange are derived. Public key cryptographic schemes based on the new systems are established. Authentication and signature schemes are easy to implement. The schemes may be integrated with error-correcting coding schemes so that encryption/coding and decryption/decoding may be done simultan...

متن کامل

Keyless Cryptography in Grid Computing Using Cyclic Shift Transposition Algorithm

Grid computing involves in the process of forming dynamic virtual organizations and associated resources in which the security is an important factor.Grid computing, is a distributed computing model in which new kind of systems are combined to form a heterogeneous computational resources such as computers, storage space, sensors, and experimental data. The grid can seamlessly, transparently and...

متن کامل

A Practical Key Exchange for the Internet using Lattice Cryptography

In [21], Peikert presents an efficient and provably secure set of lower level primitives for practical post-quantum cryptography. These primitives also give the first lattice-based scheme to provide perfect forward secrecy, and thus represent a major advancement in providing the same sort of security guarantees that are now expected for modern internet traffic protection. However, the presentat...

متن کامل

Two-party authenticated key exchange protocol using lattice-based cryptography

Authenticated key exchange (AKE) protocol is an important cryptographic primitive that assists communicating entities, who are communicating over an insecure network, to establish a shared session key to be used for protecting their subsequent communication. Lattice-based cryptographic primitives are believed to provide resilience against attacks from quantum computers. An efficient AKE protoco...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information Processing Letters

سال: 1983

ISSN: 0020-0190

DOI: 10.1016/0020-0190(83)90029-7