On the Security of Ping-Pong Protocols
نویسندگان
چکیده
Consider the class of protocols, for two participants, in which the initiator applies a sequence of operators to a message M and sends it to the other participant ; in each step, one of the participants applies a sequence of operators to the message received last, and sends it back . This "ping-pong" action continues several times, using sequences of operators as specified by the protocol . The set of operators may include public-key encryptions and decryptions. An 0(n') algorithm which determines the security of a given protocol (of length n) is presented . This is an improvement of the algorithm of Dolev and Yao (IEEE Trans. Inform . Theory IT-30 (2) (1983), 198-208) .
منابع مشابه
On the Security of Ping-Pong Protocols when Implemented using the RSA
The Security of the RSA implementation of ping-pong protocols is considered. It is shown that the obvious RSA properties, such as "multiplicativity", do not endanger the security of ping-pong protocols. Namely, if a ping-pong protocol is secure in general then its implementation using an "ideal RSA" is also secure.
متن کاملEavesdropping on the “ping-pong” type quantum communication protocols with invisible photon
The crucial issue of quantum communication protocol is its security. A quantum communication scheme must be based on the existing or nearly existing technology, but its security must be guaranteed against an eavesdropper whose technology is limited only by the laws of quantum mechanics. In this paper, we show that all the deterministic and direct two-way quantum communication protocols, sometim...
متن کاملA Sufficient Condition for Secure Ping-Pong Protocols
A sufficient condition for secure ping–pong protocols is repretsented. This condition, called name– suffixing, is essentially to insert identities of participants in messages. We prove its sufficiency and discuss the feature of security in terms of name–suffixing.
متن کاملSecurity of the quantum direct communication based on pairs of completely entangled qudits
Quantum secure direct communication protocols offer confidential transmission of classic information over the quantum channel without a prior key agreement. The ping-pong based protocols provide asymptotic security and detailed analysis of the security level provided by each variant of the protocol is required. The paper presents a general method of calculation of the eavesdropped information a...
متن کاملCitronellyl Butyrate Synthesis in Non-Conventional Media Using Packed-Bed Immobilized Candida Rugosa Lipase Reactor
The synthesis of citronellyl butyrate by direct esterification reaction catalyzed by immobilized lipase from Candida rugosa was studied in a continuous packed bed reactor using n-hexane as organic solvent. Parameters such as residence time, temperature, and pH were examined. The optimum conversion was obtained at a flow rate of 1 ml/min (residence time 8 min), temperature of 50 °C, and pH 7.5. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Information and Control
دوره 55 شماره
صفحات -
تاریخ انتشار 1982