نتایج جستجو برای: perfect secrecy

تعداد نتایج: 50745  

2008
Yong Ho Kim Kyu Young Choi Jongin Lim Dong Hoon Lee

In this paper, we propose an efficient authenticated key establishment scheme for self-organizing sensor networks. The proposed scheme has low communication cost and eliminates expensive operations required by most ID-based schemes, such as sensor nodes calculating bilinear maps. Additionally, the proposed scheme provides perfect forward secrecy.

Journal: :Des. Codes Cryptography 1996
Chris J. Mitchell Fred Piper Michael Walker Peter R. Wild

Journal: :CoRR 2008
Nithin Nagaraj Prabhakar G. Vaidya

In this letter, we prove that the perfectly secure One-Time Pad (OTP) encryption can be seen as finding the initial condition on the binary map under a random switch based on the perfectly random pad. This turns out to be a special case of Grangetto’s randomized arithmetic coding performed on the Binary Map. Furthermore, we derive the set of possible perfect secrecy systems using such an approa...

Journal: :Expert Systems With Applications 2021

We propose a secure voting protocol for score-based rules, where independent talliers perform the tallying procedure. The outputs winning candidate(s) while preserving privacy of voters and secrecy ballots. It offers perfect secrecy, in sense that apart from desired output, all other information – ballots, intermediate values, final scores received by each candidates is not disclosed to any par...

Journal: :IACR Cryptology ePrint Archive 2004
Guohong Xie

Noel McCullagh and Paulo S. L. M. Barreto[1] proposed a two-party identity-based key agreement protocol in 2004,which can be used in either escrowed or escrowless mode. They also described conditions under which users of different Key Generation Centres can agree on a shared secret key. In this paper, we show that these two protocols are insecure against the key compromis impersonate attack,and...

, ,

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید