نتایج جستجو برای: message authentication

تعداد نتایج: 99488  

Journal: :The International Conference on Electrical Engineering 1998

1998
Reihaneh Safavi-Naini Huaxiong Wang

Multi-receiver authentication is an extension of traditional point-to-point message authentication in which a sender broadcasts a single authenticated message such that all the receivers can independently verify the authenticity of the message, and malicious groups of up to a given size of receivers can not successfully impersonate the transmitter, or substitute a transmitted message. This pape...

2016
Wenwen Tu Lifeng Lai

We consider the problem of keyless message authentication over noisy channels in the presence of an active adversary. Different from the existing models, in our model, the legitimate users do not have any pre-shared key for authentication. Instead, we use the noisy channel connecting the legitimate users for authentication. The main idea is to utilize the noisy channel connecting the legitimate...

2014
Abhishek Tripathi Kavita Burse

Secret and secure delivery of message is most important issue in field of security hence signcryption were used. The term signcryption is referred as a technique of encrypting the data with the use of signatures in area of public key cryptography. A signcryption technique is a combination of digital signature which is used for authentication and public key cryptography which is used for securin...

2014
N. R. Wankhade

confidentiality and security to the data is actually provided by an authentication . Authentication involves the confident identification of one party by another party or a process of confirming an identity .But now a days there are various methods for authentication such as Message Authentication Code, Signcryption, Key Aggregate System are emerged very rapidly for better security precaution. ...

Journal: :J. UCS 2009
Basel Alomair Radha Poovendran

In cryptology, secure channels enable the exchange of messages in a confidential and authenticated manner. The literature of cryptology is rich with proposals and analysis that address the secure communication over public (insecure) channels. In this work, we propose an information theoretically secure direction for the construction of secure channels. First, we propose a method of achieving un...

1997
Marc Fischlin

We introduce the relationship between incremental cryptography and memory checkers. We present an incremental message authentication scheme based on the XOR MACs which supports insertion, deletion and other single block operations. Our scheme takes only a constant number of pseudorandom function evaluations for each update step and produces smaller authentication codes than the tree scheme pres...

Journal: :Des. Codes Cryptography 2010
Atefeh Mashatan Douglas R. Stinson

We investigate unconditional security for message authentication protocols that are designed using two-channel cryptography. We look at both noninteractive message authentication protocols (NIMAPs) and interactive message authentication protocols (IMAPs). We provide a new proof of nonexistence of nontrivial unconditionally secure NIMAPs. This proof consists of a combinatorial counting argument ...

2001
AHMET M. ESKICIOGLU

In modern electronic distribution networks, message authentication is an important objective of information security. This objective is met by providing the receiver of a message an assurance of the sender’s identity. As physical protection such as sealed envelopes is not possible for messages expressed as binary sequences, digital tools have been developed using cryptography. A major limitatio...

2005
Sylvain Pasini Serge Vaudenay Yi Lu

A secure peer-to-peer communication over an insecure channel without any prior exchanged key can be established with the help of an authentication step to exchange a public key. Then, standard methods of public-key cryptography such as RSA can be used to communicate securely. In this work, we concentrate on message authentication protocols which require an extra authenticated channel. We start ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید