نتایج جستجو برای: perfect secrecy

تعداد نتایج: 50745  

Journal: :Entropy 2012
Bin Dai Yuan Luo

In this paper, the model of wiretap channel has been reconsidered for the case that the main channel is controlled by channel state information (side information), and it is available at the transmitter in a noncausal manner (termed here noncausal side information) or causal manner (termed here causal side information). Inner and outer bounds are derived on the capacity-equivocation regions for...

Journal: :CoRR 2004
Andrew Thangaraj Souvik Dihidar A. Robert Calderbank Steven W. McLaughlin Jean-Marc Merolla

With the advent of quantum key distribution (QKD) systems, perfect (i.e. information-theoretic) security can now be achieved for distribution of a cryptographic key. QKD systems and similar protocols use classical error-correcting codes for both error correction (for the honest parties to correct errors) and privacy amplification (to make an eavesdropper fully ignorant). From a coding perspecti...

2017
Guilherme Oliveira Samuel Mafra Evelio Fernández

Eavesdropping is a major concern in Cognitive Radio relay systems, due to the broadcast nature of these systems. Physical Layer Security (PLS) has been seen as a good alternative to enhance the secrecy performance of these networks. Based on the concept of perfect secrecy, PLS uses an information-theoretic approach to prevent secondary transmissions from malicious attacks. In this paper, the Se...

Journal: :JNW 2010
Mengbo Hou Qiuliang Xu Shanqing Guo Han Jiang

Two-party authenticated key agreement protocol is used to authenticate entities and establish session keys in an open network in order to provide secure communications between two parties. Several security attributes are highly desired for such protocols, such as perfect forward secrecy (the corruption of long-term keys of all the entities should not compromise any session key), PKG forward sec...

2004
K. Cartrysse J.C.A. van der Lubbe

Mobile code is code that can be executed at a remote location, where beforehand it might not be known whether this location is trustworthy and a requirement may be that the to be executed code is encrypted and remains encrypted during execution. This paper presents a model of mobile code and defines perfect secrecy. The model and definition allows to derive conditions and theoretical boundaries...

2013
J. A. Alvarez-Bermejo J. A. Lopez-Ramos

The aim of this paper is to introduce a protocol for multicast distribution of secrets providing perfect forward and backward secrecy. The protocol is based on pairings on elliptic curves and has low cost communications and key storage. It is shown how this protocol improves some alternatives existing for real time communications. Keywords—Information security, multicast communications, ellipti...

2007
Kristiina Karvonen Yogesh Prem Swami

IPsec is a collection of protocols that provides network layer data integrity and confidentiality services. IKEv1 is a versatile key agreement protocol that allows perfect forward secrecy and identity protection (among other things). IKEv2 has similar functionalities as IKEv1, but provides a simpler and better approach to key exchange. Additionally, IKEv2 provides new methods for authentication...

Journal: :IACR Cryptology ePrint Archive 2010
Debiao He Jianhua Chen Jin Hu

Recently, Yoon et al. and Wu proposed two improved remote mutual authentication and key agreement schemes for mobile devices on elliptic curve cryptosystem. In this paper, we show that Yoon et al.’s protocol fails to provide explicit key perfect forward secrecy and fails to achieve explicit key confirmation. We also point out Wu’s scheme decreases efficiency by using the double secret keys and ...

Journal: :RFC 2011
Violeta Cakulev Ganapathy S. Sundaram

This document describes a key management protocol variant for the Multimedia Internet KEYing (MIKEY) protocol that relies on a trusted key management service. In particular, this variant utilizes Identity-Based Authenticated Key Exchange (IBAKE) framework that allows the participating clients to perform mutual authentication and derive a session key in an asymmetric Identity-Based Encryption (I...

Journal: :IACR Cryptology ePrint Archive 2016
Amir Herzberg Yehonatan Kfir

We study the use of known, well-connected network topology, to improve key setup and management. Specifically, we present the TopKeyS protocol, that uses such known-topology to allow easier, plug and play key distribution. Furthermore, ,TopKeyS improves security by limiting impact of key exposures: it ensures both perfect forward secrecy and proactive key refresh, re-establishing security after...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید