On the security of ping-pong protocols

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Security of Ping-Pong Protocols

Consider the class of protocols, for two participants, in which the initiator applies a sequence of operators to a message M and sends it to the other participant ; in each step, one of the participants applies a sequence of operators to the message received last, and sends it back . This "ping-pong" action continues several times, using sequences of operators as specified by the protocol . The...

متن کامل

On the Security of Ping-Pong Protocols when Implemented using the RSA

The Security of the RSA implementation of ping-pong protocols is considered. It is shown that the obvious RSA properties, such as "multiplicativity", do not endanger the security of ping-pong protocols. Namely, if a ping-pong protocol is secure in general then its implementation using an "ideal RSA" is also secure.

متن کامل

On the Security of the Ping-Pong Protocol

We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol. We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our original security proof is erroneous.

متن کامل

On the Security of Multi - Party Ping - Pong Protocols ( fragments of a

This paper is concerned with the model for security of cryptographic protocols suggested by Dolev and Yao. The Dolev and Yao model deals with a restricted class of protocols, known as Two-Party Ping-Pong Protocols. In such a protocol, messages are exchanged in a memoryless manner. That is, the message sent by each party results from applying a predetermined operator to the message he has receiv...

متن کامل

On the Security of Quantum Key Distribution Ping-Pong Protocol

Computational based cryptography might not guarantee long term security if computational algorithms, computers, and so on are made remarkable progress. Therefore, quantum cryptography with unconditionally security attracts attention. In this paper, we consider security of a two-way quantum key distribution protocol, so called Ping-Pong protocol. As a result, we introduce not only robustness but...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information and Control

سال: 1982

ISSN: 0019-9958

DOI: 10.1016/s0019-9958(82)90401-6