منابع مشابه
On the Security of Ping-Pong Protocols
Consider the class of protocols, for two participants, in which the initiator applies a sequence of operators to a message M and sends it to the other participant ; in each step, one of the participants applies a sequence of operators to the message received last, and sends it back . This "ping-pong" action continues several times, using sequences of operators as specified by the protocol . The...
متن کاملOn the Security of Ping-Pong Protocols when Implemented using the RSA
The Security of the RSA implementation of ping-pong protocols is considered. It is shown that the obvious RSA properties, such as "multiplicativity", do not endanger the security of ping-pong protocols. Namely, if a ping-pong protocol is secure in general then its implementation using an "ideal RSA" is also secure.
متن کاملOn the Security of the Ping-Pong Protocol
We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol. We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our original security proof is erroneous.
متن کاملOn the Security of Multi - Party Ping - Pong Protocols ( fragments of a
This paper is concerned with the model for security of cryptographic protocols suggested by Dolev and Yao. The Dolev and Yao model deals with a restricted class of protocols, known as Two-Party Ping-Pong Protocols. In such a protocol, messages are exchanged in a memoryless manner. That is, the message sent by each party results from applying a predetermined operator to the message he has receiv...
متن کاملOn the Security of Quantum Key Distribution Ping-Pong Protocol
Computational based cryptography might not guarantee long term security if computational algorithms, computers, and so on are made remarkable progress. Therefore, quantum cryptography with unconditionally security attracts attention. In this paper, we consider security of a two-way quantum key distribution protocol, so called Ping-Pong protocol. As a result, we introduce not only robustness but...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information and Control
سال: 1982
ISSN: 0019-9958
DOI: 10.1016/s0019-9958(82)90401-6