نتایج جستجو برای: perfect secrecy

تعداد نتایج: 50745  

Journal: :IACR Cryptology ePrint Archive 2013
Jayaprakash Kar

The article proposes a provably secure authenticated multiple key establishment protocol for Wireless Sensor Network. Security of the protocol is based on the computational infeasiblity of solving Elliptic Curve Discrete Logarithm Problem and Computational Diffie-Hellman Problem on Bilinear Pairing. User authentication is a one of the most challenging security requirement in wireless sensor net...

2004
Roger Dingledine Nick Mathewson Paul Syverson

We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, and a practical design for location-hidden services via rendezvous points. Tor works on the real-world Intern...

2004
Roger Dingledine Nick Mathewson Paul F. Syverson

We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design. Tor adds perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, and a practical design for rendezvous points. Tor works on the real-world Internet, requires no special privi...

Journal: :مهندسی برق مدرس 0
shokofe vatanpour m.sc. student, department of electrical engineering, shahrood university of technology, iran. mohammad reza jvan assistant professor, department of electrical engineering, shahrood university of technology, iran

in this paper, we consider a cooperative cognitive radio network in which there is an ofdm primary link and multiple single carrier secondary links.the primary link is required to maintain its secrecy rate above a predefined threshold. if the secrecy rate requirement is not satisfied, the secondary system help primary link to maintain its secrecy rate requirement. in doing so, the secondary trans...

Journal: :CoRR 2013
Pengwei Wang Reihaneh Safavi-Naini

In wiretap model of secure communication, the goal is to provide (asymptotic) perfect secrecy and reliability over a noisy channel that is eavesdropped by an adversary with unlimited computational power. This goal is achieved by taking advantage of the channel noise and without requiring a shared key. The model has attracted considerable attention in recent years because it captures eavesdroppi...

Journal: :International journal of recent technology and engineering 2022

The group key management technique is an important for cryptographic applications. In this paper, we implemented our proposed method [1] on a protocol communication. authenticated distribution mechanism distributing key. We also discussed security analysis and attacks in active passive adversary model. Also, it ensures semantic as well Key freshness of the Along with this, they provide implicit...

2011
Eun-Jun YOON

Remote mutual authentication is an important part of security, along with confidentiality and integrity, for systems that allow remote access over untrustworthy networks, like the Internet. In 2006, Shieh-Wang pointed out the weakness of Juang’s remote mutual authentication scheme using smart card and further proposed a novel remote user authentication scheme using smart card. However, this pap...

2016
Jian Liu Sihem Mesnager Lusheng Chen

Homomorphic encryption scheme enables computation in the encrypted domain, which is of great importance because of its wide and growing range of applications. The main issue with the known fully (or partially) homomorphic encryption schemes is the high computational complexity and large communication cost required for their execution. In this work, we study symmetric partially homomorphic encry...

2006
YAO Gang FENG Deng-Guo

To achieve security in the networks, it is important to be able to encrypt and authenticate messages sent between the users. Keys for encryption and authentication purposes must be agreed upon by the users in the networks. Three new pairwise key agreement protocols based on Weil pairing are proposed in this paper. In those protocols, all the users share common secret information. They may arran...

Journal: :IACR Cryptology ePrint Archive 2010
He Debiao Chen Jianhua Hu Jin

Recently, Yoon et al. and Wu proposed two improved remote mutual authentication and key agreement scheme for mobile devices on elliptic curve cryptosystem. In this paper, we show that Yoon et al.’s protocol fails to provide explicit key perfect forward secrecy and fails to achieve explicit key confirmation. We also point out Wu’s scheme decreases efficiency by using the double secret keys and i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید