نتایج جستجو برای: secret key

تعداد نتایج: 564100  

2007
Paulo F. Oliveira Rui A. Costa João Barros

We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main contribution is a practical scheme that relies on network coding to provide a robust and low-complexity solution for sharing secret keys among sensor nodes. In spite of its role as a key enabler for this approach, the...

2011
Eli Biham Adi Shamir

In September 1996 Boneh, Demillo, and Lipton from Bellcore announced a new type of cryptanalytic attack which exploits computational errors to nd cryptographic keys. Their attack is based on algebraic properties of modular arithmetic, and thus it is applicable only to public key cryptosystems such as RSA, and not to secret key algorithms such as the Data Encryption Standard (DES). In this paper...

1997
Joan Daemen

In this paper we describe mechanisms for the management of secret keys, used in the securization of financial applications. The mechanisms Dynamic Key Handling and Reversed Dynamic Key Handling can be seen as particular methods to diversify keys in time, compatible with the present diversification by terminal and/or electronic purse.

2017
J. Barros M. R. D. Rodrigues

The multipath-rich wireless atmosphere allied with typical wireless usage scenarios is characterized by a vanishing channel retort that is time-varying, location-sensitive, and only shared by a given transmitter–receiver pair. The complexity allied with a highly scattering atmosphere implies that the short-term vanishing process is intrinsically hard to envisage and best modeled stochastically,...

Journal: :Inf. Sci. 2010
Hong Yuan Futai Zhang Xinyi Huang Yi Mu Willy Susilo Lei Zhang

A (t,n) threshold signature scheme allows t or more group members to generate signatures on behalf of a group with nmembers. In contrast to the traditional public key cryptography based on public key infrastructure (PKI) and identity-based public key cryptography (IDPKC), certificateless public key cryptography (CL-PKC) offers useful properties as it does not require any certificates to ensure ...

Journal: :IEICE Transactions 2015
Eiichiro Fujisaki Akinori Kawachi Ryo Nishimaki Keisuke Tanaka Kenji Yasunaga

Leakage resilient cryptography is often considered in the presence of a very strong leakage oracle: An adversary may submit arbitrary efficiently computable function f to the leakage oracle to receive f (x), where x denotes the entire secret that a party possesses. This model is somewhat too strong in the setting of public-key encryption (PKE). It is known that no secret-key leakage resilient P...

Journal: :IEEE Transactions on Communications 2022

We study the secret key rate (SKR) of a multiple-input multiple-output (MIMO) continuous variable quantum distribution (CVQKD) system operating at terahertz (THz) frequencies, accounting for effects channel estimation. propose practical estimation scheme THz MIMO CVQKD which is necessary to realize transmit-receive beamforming between Alice and Bob. characterize input-output relation Bob during...

Journal: :Parallel Processing Letters 2010
Naya Nagy Marius Nagy Selim G. Akl

It has been said that quantum cryptography in general o ers a secure solution to the problem of key enhancement. This means that two parties who already share a small secret key, can use quantum protocols to establish a new large secret key. This large secret key can be arbitrarily long and is unbreakable. Thus, to date, the main contribution of quantum cryptography has been believed to be quan...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید