نتایج جستجو برای: perfect secrecy

تعداد نتایج: 50745  

Journal: :Int. J. Satellite Communications Networking 2014
Jia-Lun Tsai Nai-Wei Lo Tzong-Chen Wu

An authentication scheme is one of the most basic and important security mechanisms for satellite communication systems because it prevents illegal access by an adversary. Lee et al. recently proposed an efficient authentication scheme for mobile satellite communication systems. However, we observed that this authentication scheme is vulnerable to a denial of service (DoS) attack and does not o...

Journal: :I. J. Network Security 2016
Zheng Yang Daigu Zhang

We propose two security models for one-round group key exchange (ORGKE), which are called as g-eCKw and g-eCK-PFS. The g-eCK-PFS is a stronger variant of geCKw, which particularly formulates perfect forward secrecy for ORGKE. A new tripartite ORGKE is proposed to provide g-eCKw security without random oracles under standard assumptions, that is also more efficient than its predecessor by Li and...

Journal: :IACR Cryptology ePrint Archive 2011
Akinori Kawachi Christopher Portmann Keisuke Tanaka

Roughly speaking, an encryption scheme is said to be non-malleable, if no adversary can modify a ciphertext so that the resulting message is meaningfully related to the original message. We compare this notion of security to secrecy and authenticity, and provide a complete characterization of their relative strengths. In particular, we show that information-theoretic perfect non-malleability is...

Journal: :CoRR 2014
Reevana Balmahoon A. J. Han Vinck Ling Cheng

Correlated sources are present in communication systems where protocols ensure that there is some predetermined information for sources to transmit. Here, two correlated sources across a channel with eavesdroppers are investigated, and conditions for perfect secrecy when some channel information and some source data symbols (the predetermined information) have been wiretapped are determined. Th...

Journal: :IACR Cryptology ePrint Archive 2014
Weiqiang Wen Libin Wang Min Xie

In response to the need for secure one-round authenticated key exchange protocols providing both perfect forward secrecy and full deniability, we put forward a new paradigm for constructing protocols from a Diffie-Hellman type protocol plus a non-interactive designated verifier proof of knowledge (DV-PoK) scheme. We define the notion of DV-PoK which is a variant of non-interactive zero-knowledg...

2013
Haiyan Sun Qiaoyan Wen Hua Zhang Zhengping Jin

Recently, many identity (ID)-based user authentication and key agreement schemes for mobile client-server environment were proposed. However, these schemes are subjected to an inherent design weakness, namely, the server knows all users’ private keys. Under this problem, these schemes cannot provide insider attack resistance or mutual authentication. Furthermore, some of these schemes cannot si...

Journal: :IEEE Transactions on Information Forensics and Security 2016

Journal: :CoRR 2016
Thibault de Valroger

We present numerical simulations measuring secrecy and efficiency rate of Perfect Secrecy protocol based on Deep Random assumption presented in former article [9]. Those simulations specifically measure the respective error rates of both legitimate partner and eavesdropper experimented during the exchange of a data flow through the protocol. The measurements of the error rates also enable us to...

Journal: :CoRR 2015
Flávio du Pin Calmon Muriel Médard Mayank Varia Ken R. Duffy Mark M. Christiansen Linda M. Zeger

We present information-theoretic definitions and results for analyzing symmetric-key encryption schemes beyond the perfect secrecy regime, i.e. when perfect secrecy is not attained. We adopt two lines of analysis, one based on lossless source coding, and another akin to ratedistortion theory. We start by presenting a new information-theoretic metric for security, called ǫ-symbol secrecy, and de...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید