Secure voice cryptography based on Diffie-Hellman algorithm

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Bilinear Diffie-Hellman Bits

The Weil and Tate pairings are a popular new gadget in cryptography and have found many applications, including identity-based cryptography. In particular, the pairings have been used for key exchange protocols. This paper studies the bit security of keys obtained using protocols based on pairings (that is, we show that obtaining certain bits of the common key is as hard as computing the entire...

متن کامل

Deniable Authentication Protocol based on Bilinear Diffie - Hellman Algorithm

This paper describes a new deniable authentication protocol whose security is based Diffe-Hellman (CDH) Problem of type Decisional Diffie-Hellman(DDH) and the Hash DiffieHellman (HDDH) problem.This protocol can be implemented in low power and small processor mobile devices such as smart card, PDA etc which work in low power and small processor. A deniable authentication protocol enables a recei...

متن کامل

A New Diffie-Hellman Algorithm based on Bidirectional Chaotic Systems

The aim of this paper is to development a very strong cryptographic systems using hyperelliptic Curves and Complete Synchronization for a Bidirectional Chaotic systems based on Lorenz attractor. Also performance simulations of SISO and MIMO systems over fading channels produce a benefit of 16dB for BER=10e−6 once the wireless channel is ensured. Key-Words:Diffie-Hellman Key Exchange, -Public Ke...

متن کامل

Circular-Secure Encryption from Decision Diffie-Hellman

We describe a public-key encryption system that remains secure even encrypting messages that depend on the secret keys in use. In particular, it remains secure under a “key cycle” usage, where we have a cycle of public/secret key-pairs (pki, ski) for i = 1, . . . , n, and we encrypt each ski under pk(i mod n)+1. Such usage scenarios sometimes arise in key-management systems and in the context o...

متن کامل

A secure Deniable Authentication Protocol based on Bilinear Diffie-Hellman Algorithm

This paper describes a new deniable authentication protocol whose security is based Diffe-Hellman (CDH) Problem of type Decisional Diffie-Hellman(DDH) and the Hash Diffie-Hellman (HDDH) problem.This protocol can be implemented in low power and small processor mobile devices such as smart card, PDA etc which work in low power and small processor. A deniable authentication protocol enables a rece...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IOP Conference Series: Materials Science and Engineering

سال: 2021

ISSN: 1757-8981,1757-899X

DOI: 10.1088/1757-899x/1076/1/012057