Quantum password sharing scheme using trusted servers

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantum password sharing scheme using trusted servers

Received Nov 23 th , 2012 Accepted Dec 28 th , 2012 The main purpose of the sharing schemes based on trusted servers is to obtain a password. The threshold cryptography aims the secret cryptographic protection, and is based on the distribution of the key on several servers, with the purpose to tolerate the attacks. In this work I will present a quantum version of the password sharing protocol, ...

متن کامل

Efficient Password Scheme Without Trusted Server

In 2005, Lee suggested a password scheme for three participants without trusted server. Lee claimed that the scheme can withstand different attacks and give the perfect secrecy. In this paper, the authors demonstrate what the Lee scheme undergoes from the imitation attack. Simultaneously, the authors suggest an enhanced algorithm to resist the mentioned attacks. guessing attack (Shim & Woo, 200...

متن کامل

Optimized Secure Position Sharing with Non-trusted Servers

Today, location-based applications and services such as friend finders and geo-social networks are very popular. However, storing private position information on thirdparty location servers leads to privacy problems. In our previous work, we proposed a position sharing approach for secure management of positions on non-trusted servers [1, 2], which distributes position shares of limited precisi...

متن کامل

A Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards Multiple Servers to Server

With rapid changes in the modern communication environment such as wireless mesh networks and cloud storing, it is necessary to put forward a kind more flexible and general architecture to adapt it. But the overwhelming majority of passwordauthenticated key agreement protocols using chaotic maps are based on three architectures (client/server, two clients/server and multi-server) and four secur...

متن کامل

One Time Password Scheme Via Secret Sharing Techniques

....................................................................................................................................................... v

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Information and Network Security (IJINS)

سال: 2013

ISSN: 2089-3299

DOI: 10.11591/ijins.v2i3.1838