Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography
نویسندگان
چکیده
منابع مشابه
Learning to Protect Communications with Adversarial Neural Cryptography
We ask whether neural networks can learn to use secret keys to protect information from other neural networks. Specifically, we focus on ensuring confidentiality properties in a multiagent system, and we specify those properties in terms of an adversary. Thus, a system may consist of neural networks named Alice and Bob, and we aim to limit what a third neural network named Eve learns from eaves...
متن کاملSecure E-learning and Cryptography
This chapter investigates the problem of secure e-learning and the use cryptography algorithms as tools to ensure integrity, confidentiality, non-reputations, authentication, and access control to provide secure knowledge delivery, secure student feedback, and secure assessments. Providing privacy in e-learning focuses on the protection of personal information of a learner in an e-learning syst...
متن کاملPerfectly Secure Multiparty Computation and the Computational Overhead of Cryptography
We study the following two related questions: – What are the minimal computational resources required for general secure multiparty computation in the presence of an honest majority? – What are the minimal resources required for two-party primitives such as zero-knowledge proofs and general secure two-party computation? We obtain a nearly tight answer to the first question by presenting a perfe...
متن کاملChaos Based Cryptography : a New Approach to Secure Communications
Cryptography is the science of protecting the privacy of information during communication under hostile conditions. In the present era of information technology and proliferating computer network communications, cryptography assumes special importance. Cryptography is now routinely used to protect data, which must be communicated and/or saved over long periods, to protect electronic fund transf...
متن کاملHyperchaos based Cryptography: New Seven Dimensional Systems to Secure Communications
The growth of technology and the emphasis on privacy have intensified the need to find a fast and secure cryptographic method. As chaotic signals are usually noise-like and chaotic systems are very sensitive to the initial condition, they can be used in cryptography. We have analyzed the properties of two new hyperchaotic systems that we have developed and then propose a secure chaotic cryptogr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Sensors
سال: 2018
ISSN: 1424-8220
DOI: 10.3390/s18051306