Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Learning to Protect Communications with Adversarial Neural Cryptography

We ask whether neural networks can learn to use secret keys to protect information from other neural networks. Specifically, we focus on ensuring confidentiality properties in a multiagent system, and we specify those properties in terms of an adversary. Thus, a system may consist of neural networks named Alice and Bob, and we aim to limit what a third neural network named Eve learns from eaves...

متن کامل

Secure E-learning and Cryptography

This chapter investigates the problem of secure e-learning and the use cryptography algorithms as tools to ensure integrity, confidentiality, non-reputations, authentication, and access control to provide secure knowledge delivery, secure student feedback, and secure assessments. Providing privacy in e-learning focuses on the protection of personal information of a learner in an e-learning syst...

متن کامل

Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography

We study the following two related questions: – What are the minimal computational resources required for general secure multiparty computation in the presence of an honest majority? – What are the minimal resources required for two-party primitives such as zero-knowledge proofs and general secure two-party computation? We obtain a nearly tight answer to the first question by presenting a perfe...

متن کامل

Chaos Based Cryptography : a New Approach to Secure Communications

Cryptography is the science of protecting the privacy of information during communication under hostile conditions. In the present era of information technology and proliferating computer network communications, cryptography assumes special importance. Cryptography is now routinely used to protect data, which must be communicated and/or saved over long periods, to protect electronic fund transf...

متن کامل

Hyperchaos based Cryptography: New Seven Dimensional Systems to Secure Communications

The growth of technology and the emphasis on privacy have intensified the need to find a fast and secure cryptographic method. As chaotic signals are usually noise-like and chaotic systems are very sensitive to the initial condition, they can be used in cryptography. We have analyzed the properties of two new hyperchaotic systems that we have developed and then propose a secure chaotic cryptogr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Sensors

سال: 2018

ISSN: 1424-8220

DOI: 10.3390/s18051306